Senetas hardware has set the standard for secure Layer 2 encryption for many years. However, as networks have evolved to become increasingly virtualised and borderless, there is greater demand to add encryption security at Layers 3 and 4.
Senetas designs, develops and manufactures certified high-assurance encryption hardware to protect all types of data in transit across all current network protocols and topologies.
The best encryption solutions are not only suitable for networks of all types, they occupy a barely perceptible presence on the network, are transparent to other devices and result in minimal latency. They also mitigate the threat of future technologies such as quantum computing.
Encryption depends upon secure key management to
deliver the information needed to encrypt and decrypt frames. To ensure any breached data is rendered meaningless in the hands of an unauthorised user, it is essential to restrict access to the encryption keys themselves.
Senetas cybersecurity solutions protect data in transit across high-speed networks. Applications include SCADA Control Systems, CCTV Networks, Datacentre Services and Smart Cities.
As remote working becomes the new normal, cybercriminals are increasingly targeting more vulnerable users. The demand for secure filesharing, storage and collaboration has never been greater.
Legacy anti-malware solutions are no longer fit for purpose. Protecting users from the most advanced and persistent malware and ransomware attacks, demands a pro-active approach to content security.
As cybersecurity experts and government agencies alike advocate for the migration to a quantum resilient stance, Senetas has already introduced post-quantum cryptography in the form of hybrid encryption.
The CV1000 is the first crypto-agile Virtualised Network Function (VNF) designed for large-scale, virtualised WAN/MAN encryption to the network edge.
An encrypted file-sharing and collaboration platform, SureDrop combines ease of use with enhanced security, end-to-end encryption and 100% data sovereignty control.
Votiro leverages patented, next gen CDR anti-malware technology to proactively protect your files from the most advanced, persistent cyber-attacks.
Senetas CM7 Network Encryption Manager (CypherManager™) is Senetas’ innovative encryption management platform. It enables the intuitive management of the full range of Senetas CN network encryptors.
From infographics and eBooks to brochures and case studies. Find out more about Senetas cybersecurity solutions and how they can help you.
Keep up-to-date with all the encryption and cybersecurity trends and best practices. Our finger is on the pulse of the industry.
Discover all the latest cybersecurity industry news and developments, plus what's going on here at Senetas.
Browse the archives of Senetas View, our encryption and cybersecurity newsletter. Like what you see? Sign up to get it in your inbox.
Find out more about our support and maintenance agreements, both internationally and for the Australia and New Zealand markets.
Encryption terminology can be confusing, but we aim to make it simple. Browse our terms if you aren't sure what something means.
Senetas CN Series hardware encryption, CV Series virtual encryption and SureDrop secure file-sharing solutions are distributed exclusively (outside Australia & New Zealand) to Enterprise, SME and Service Provider customers by Thales.
Our encryption solutions are distributed throughout Australia and New Zealand by ourselves and our trusted ANZ partner community.
We are proud to work with a number of international partners, each bringing unique expertise. Find out more about them here.
If you are a service provider, reseller or integrator of converged networks, or if you provide applications for sensitive data, then a partnership with Senetas could help you add value to both your solutions and your clients.
Senetas technology partners are a breed apart. They own unique data in motion technologies and are committed to best-in-class data security.
Our partner-specific resource library contains a range of technical, marketing, and pre-sales support documentation for partner organisations. Click below to log in or to register for access.
Senetas is a leading developer of cybersecurity solutions; trusted to protect enterprise, government, defence, cloud and service provider data in over 40 countries.
For over 20 years we have been at the forefront of cybersecurity innovation. We remain committed to excellence in R&D, independent certification, and best-practice security of high-speed data networks.
Our board of directors is comprised of experienced and respected members of the business community. Their focus includes maintaining the company’s integrity, ethics and standards of excellence.
Visit our interactive investor hub to view and engage with our ASX announcements, webinars and updates, and to interact with the Senetas leadership team.
Key documents and policies are available here and form part of our corporate governance framework, highlighting the company’s significant commitment to best practice.
Over the July 4th weekend, the US was hit by what one expert described as a “colossal and devastating supply
• SCADA network hacks are more about systems access than data theft. • Hackers are specifically targeting critical infrastructure organisations.
High-tech industries have become a popular target for cyber criminals because of the rich rewards a data breach can yield. With the increased use of Cloud-based business transformation technologies, organisations operating in these industries face a diverse and evolving threat landscape, making cybersecurity more important than ever.
As IBM and the Ponemon Institute publish their annual cost of a data breach report, three organisations are hit with massive regulatory fines that should make everyone sit up and pay attention.
Despite opinions to the contrary, metadata (data about data) should be considered sensitive information. It is the most under-estimated source of data breach riches for cyber-criminals; especially in a world of Big Data analytics and machine learning.
A failure to recognise the importance of long-term data protection exposes a deeper ignorance about the principles of best-practice cyber-security. Worse, it runs the risk of individuals failing to meet their corporate duty of care.
Network switch hacking vulnerabilities – the value of encryption certification testing and separated security duties.
Suggestions that governments legislate encryption vendors to help law enforcement decrypt criminals’ data are incongruous. Firstly, it’s not possible, because these technologies are designed to be unbreakable. Secondly, as with previous calls to mandate “back doors”, it would erode trust in vendors and encryption security. That which protects 99% of users will be compromised by a focus on the1% criminal element.
After three attempts, the Australian Government has finally passed the Notifiable Data Breach amendments to the Privacy Act. However, it seems the negotiated political compromises may well have softened its impact!
Every year for the past 5 years has been referred to as “the year of the breach”. Since 2013, 5.9
Verizon’s latest investigation into data breach incidents in 2015 makes an important revelation. It seems that cyber-criminals join business in seeking a good ROI on their efforts!
Sign up for our cybersecurity newsletter, and keep updated with latest industry news, expert opinions, events and much more.