Security – EncryptionPLUS™

You take network security seriously, and so do we!

Our Encryption feature allows for three layers of encryption for site-to-site traffic over public connections, creating secure WANs for customers looking for an alternative to MPLS.

Features that ensure your security fortress remains strong. Primarily:

Tunnel Encryption for Enterprise WANs.

The system has the ability to perform standard IPVPN encryption for hub-and-spoke WANs. Out-of-the-box, customers can choose between three ciphers to encrypt traffic between the CPE device and the Aggregation server (and vice-versa), or add additional ciphers if the three we have don’t fit the customer’s needs.

Packet-Level Distribution Across Bonded Connections.

By its nature, the technology is highly secure. The packet-level distribution algorithm spreads traffic across multiple Internet connections. Even if an attacker manages to capture one of your individual Internet connections, only a small part of your entire traffic is visible.

 

Traffic Authentication at the Node Level.

Bonded traffic is authenticated by the receiving server with a hash-based message authentication code (HMAC, from RFC2104). This prevents an attacker from modifying or forging bonded traffic between the CPE and Aggregation server. 

On top of that, security measures include:

Seamless Integration with Existing Network Architecture

Your existing network security design will not be impacted. The technology supports all encrypted VPN traffic, and is also completely transparent to SSL traffic.

 

Encrypted Device Configuration Commands

Industry-standard SSL protects the appliance from unauthorized control.

Remote Bonding Appliance (CPE) Security

The bonding appliance is controlled remotely by our special configuration server. In addition to having its own firewall, all communications between the appliance and the Aggregation server are secured by SSL, ensuring that it is protected.

On the Shoulders of Giants

Our service uses the popular open source Linux distribution Debian. Many contributors around the world work to enhance the security of this operating system, from reviewing code to ensure security issues are eliminated before release, to implementing fixes within hours of a vulnerability becoming known. You benefit from their experience and abilities.

See it in action

Book a Demo