It may come as a surprise to you, but data networks are not inherently safe. Public network infrastructure is exposed to a multitude of cyber-threats and two thirds of all data theft occurs while it is in transit*. That’s why you should insist upon certified, high-assurance encryption for your data in motion.

The greatest risks to your network data occur when your data includes sensitive information that should not become public. High data volumes (e.g. 10-100Gbps data network links) are increasingly attracting cyber-criminals’ attention.

Encrypting data in motion

Not all encryption solutions are the same.SenetasIcons_orange-31

The rapid growth of virtualisation, data centre services, Cloud computing, SaaS and Big Data technologies means we are becoming increasingly reliant on our high-speed/high-availability data networks to deliver information when and where we need it.

However, we often give little thought to where this data is travelling to, how it is stored, who may access it and what it’s been through in order to appear on our screens. Once your data leaves the perimeter of your protected systems you can’t be sure that it remains secure and doesn’t fall into the wrong hands!

When considering the protection of network data – raw source data such as voice, images and video – it is equally important to consider that data’s metadata – the potentially sensitive information about the user. This raw data should also be encrypted, both in transit and at rest.

The encryption device itself must be 100% secure, and the Encryption Key Management state-of-the-art in order for organisations to be confident they have high-assurance encryption protection.

Watch Data Networks Are Not Secure Video

The changing landscape of cyber-crime

Many network devices expose networks to data breaches.

With the majority of IT security dedicated to protecting data at rest, cyber-criminals are focusing their attention on data in motion. A potentially rich source of sensitive or valuable information, data networks are seen as “low-hanging fruit” and are increasingly coming under attack.

Firewalls, network switches and routers are not bullet proof. Only robust encryption solutions provide network data with a last line of defence.

The technology exists, and is readily available, that allows fibre optic cable to be tapped and for potentially sensitive data to be read – without breaking the link and remaining undetected without specialist security equipment.

Robust, high-assurance data encryption – the best, last line of defence

Protecting network-transmitted data against cyber-attacks and data breaches has become a business imperative.

Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. Globally, the priority for government and commercial organisations is to ensure that network transmitted data is protected by robust encryption.

The implications of a significant breach are often catastrophic; not just for the profitability and reputation of an individual company, but for the security and safety of critical infrastructure, citizens, central government and emergency services.

Only encryption may ensure that your data remains protected while transmitted across data networks and links. However, not all encryption solutions are the same.

Robust encryption (also known as high-assurance encryption) features secure, dedicated encryption devices. In order to be truly high assurance, these devices must use embedded, zero-touch encryption key management; provide end-to-end, authenticated encryption and use standards-based algorithms.

Only through high-assurance network data encryption can you be assured your data is rendered useless in unauthorised hands and that it will remain secure beyond the data’s useful life.


“Robust encryption does not need to come at the expense of network availability and performance. The Senetas range of encryptors provides maximum data protection, without compromising performance, and offers a scalable solution, suitable for all Layer 2 networks and topologies.”


Our encryptors include: small form-factor 10Mbps to 1Gbps devices; carrier-grade 1Gbps to 100Gbps and 10 x 1Gbps to 10 x 10Gbps multi-port rack-mounted units. They support all topologies, Ethernet and Fibre Channel protocols and SPB virtualisation. They operate in full-duplex mode at full line speed, with no packet loss.

*Trustwave Global Data Security Report


More on Robust Encryption