High-speed data networks are not inherently secure. Public network infrastructure is exposed to a multitude of cyber-threats and two thirds of all data theft occurs while it is in transit*. That’s why you should insist upon certified, high-assurance encryption for your data in motion.

Network data is at greatest risk when it contains sensitive, confidential or personally identifiable information. The high data volumes (10Gbps+ links) involved in every day tasks represent an increasingly attractive proposition for cyber-criminals, as they seek financial gain from the data, or metadata, available to them.


Encrypting data in motion

Not all encryption solutions are the same.SenetasIcons_orange-31

The rapid growth of virtualisation, data centre services, Cloud computing, SaaS and Big Data technologies means we are becoming increasingly reliant on our high-speed/high-availability data networks to deliver information when and where we need it.

However, we often give little thought to where this data is travelling to, how it is stored, who may access it and what it’s been through in order to appear on our screens. Once your data leaves the perimeter of your protected systems you can’t be sure that it remains secure and doesn’t fall into the wrong hands.

When considering the protection of network data, IT security professionals need to consider both the raw data source (video, text, voice etc) and the metadata associated with it. The advanced data analysis tools available today enable unauthorised users to interrogate and interpret high volumes of data, both in transit and at rest.

Should you choose to protect your network data with encryption, it’s important to understand that not all encryption solutions are the same. Look for a solution that offers high-assurance data protection; a dedicated encryption device with secure key management that provides authenticated, end-to-end encryption.

Watch Data Networks Are Not Secure Video

The changing landscape of cyber-crime

Many network devices expose networks to data breaches.

With the majority of IT security dedicated to protecting data at rest, cyber-criminals are focusing their attention on data in motion. A potentially rich source of sensitive or valuable information, data networks are seen as “low-hanging fruit” and are increasingly coming under attack.

Firewalls, network switches and routers are not bullet proof. Only robust encryption solutions provide network data with a last line of defence.

The technology exists, and is readily available, that allows fibre optic cable to be tapped and for potentially sensitive data to be read – without breaking the link and remaining undetected without specialist security equipment.


Robust, high-assurance data encryption – the best, last line of defence

Protecting network-transmitted data against cyber-attacks and data breaches has become a business imperative.

Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. Globally, the priority for government and commercial organisations is to ensure that network transmitted data is protected by robust encryption.

The implications of a significant breach are often catastrophic; not just for the profitability and reputation of an individual company, but for the security and safety of critical infrastructure, citizens, central government and emergency services.

Only encryption may ensure that your data remains protected while transmitted across data networks and links. However, not all encryption solutions are the same.

Robust encryption (also known as high-assurance encryption) features secure, dedicated encryption devices. In order to be truly high assurance, these devices must use embedded, zero-touch encryption key management; provide end-to-end, authenticated encryption and use standards-based algorithms.

Only through high-assurance network data encryption can you be assured your data is rendered useless in unauthorised hands and that it will remain secure beyond the data’s useful life.


“Robust encryption does not need to come at the expense of network availability and performance. The Senetas range of encryptors provides maximum data protection, without compromising performance, and offers a scalable solution, suitable for all Layer 2 networks and topologies.”


Our encryptors include: small form-factor 10Mbps to 1Gbps devices; carrier-grade 1Gbps to 100Gbps and 10 x 1Gbps to 10 x 10Gbps multi-port rack-mounted units. They support all topologies, Ethernet and Fibre Channel protocols and SPB virtualisation. They operate in full-duplex mode at full line speed, with no packet loss.

*Trustwave Global Data Security Report


More on Robust Encryption