For highest security requirements
The Centurion Network Encryptors (layer-2 encryptor and layer-2 over layer-3 encryptor) combine a secure device with a secure data plane, a secure control plane, and a secure management plane. They provide a protection level of "High Assurance" and are the best choice for the protection of government and enterprise multi-site networks with high security requirements. For the most stringent security requirements, the Centurion Network Encryptors also provide the option of traffic flow security, a mechanism that completely obfuscates network traffic. The Centurion Network Encryptors can secure your networks in a way that leaves any attacker frustrated. Uncompromising security. "Deploy and forget" instead of "patch and pray" also reduces operating costs and increases availability.
Multi-tenancy built in
The Centurion Network Encryptors include extensive multi-tenancy support and are also a perfect fit for managed security services. They integrate seamlessly with existing Network Operation Center (NOC), and Security Operation Center (SOC). Centurion is particularly suitable when high availability with low latency is required and where communications between servers, PBXs, terminal systems, databases and audio / video systems must be protected.
Drop in Solution
The Centurion Network Encryptors (layer-2 encryptor and layer-2 over layer-3 encryptor) provide secure encryption without the need to replace the whole network infrastructure. The Centurion appliance is autonomous and operates independently in point-to-point or large WAN networks. It is transparent to all higher layer network protocols. It is drop-in, that means it can be deployed without changing the network infrastructure or changing other network devices. It allows organizations to implement a security solution quickly with minimal network disruption while preserving current investments.