Crypto solutions

Protect people, platforms and intelligence.

Safeguarding mission-critical information that protects people, platforms and intelligence is of paramount importance in today’s operating environment. The consequences of information falling into the wrong hands could be catastrophic, even threatening to life – potentially on a large scale.

Offering both legacy and future modes of working, our range of form-fit cryptographic products are trusted by governments worldwide to protect sensitive military information, including the Ultra C3 for the UK MOD. Ultra’s products are uniquely engineered as a form-fit replacement for on-platform crypto, enabling quick integration without costly platform modifications. Designed to be future proof, the software definable technology enables it to be upgraded anywhere, anytime.

End Cryptographic Unit – ECU

Safeguarding the integrity of mission-critical information protects people, platforms and intelligence in operating environments and minimises the chance of crucial information falling into the wrong hands. Such breaches often trigger catastrophic consequences that place lives in imminent danger, potentially on a large scale.

Our End Cryptographic Unit (ECU) works seamlessly in legacy or future modes of working to protect sensitive military information.

Crypto Common Core – C3

Our Common Core Crypto (C3) module is a multi-purpose, field reprogrammable cryptographic device for deployment in the toughest of military environments. The C3 provides a certified COMSEC boundary that can be deployed in a wide range of varied scenarios.

High-grade crypto development

Safeguarding mission-critical information that protects people, platforms and intelligence is of paramount importance in today’s operating environment. The consequences of information falling into the wrong hands could be catastrophic, even threatening to life – potentially on a large scale.

Offering both legacy and future modes of working, our range of form-fit cryptographic products are trusted by governments worldwide to protect sensitive military information, including the Ultra C3 for the UK MOD. Ultra’s products are uniquely engineered as a form-fit replacement for on-platform crypto, enabling quick integration without costly platform modifications. Designed to be future proof, the software definable technology enables it to be upgraded anywhere, anytime.

At the forefront of innovation, our range of cryptographic products are designed and built in the UK and are therefore free from ITAR restrictions. Permitted to protect the highest classification of data in the UK, the fully programmable technology also allows adaptation for international interoperability standards.

Criticom ISEC

Military-grade secure video teleconferencing.

Criticom ISEC (Integrated Secure Encryption Console) solutions deliver fully automated Periods Processing as defined by US Department of Defense to seamlessly switch video conferencing systems between two different security classification networks. Users are able to seamlessly switch video conferencing systems between two different security classification networks.

  • Criticom ISEC IP Switch – Supports H.323 or SIP VTC technology to enable users to choose between security level classifications when configured for IP networking. The switch is fully integrated and ready for installation to expand your single level VTC suite into a flexible system supporting classifications on a call-by-call basis.
  • Criticom ISEC Systems – ISEC Systems seamlessly integrates the multiple components to form a complete, user-friendly system. They come in various configurations including carts, racks, a field deployable unit and a secure desktop solution – each with a variety of features designed to accommodate a diverse user base.
  • ISEC Rack System – Innovative ISEC technology switches VTC systems securely. A table top switch, wall mountable Secure/Non-Secure sign, 21 RU Cabinet, KIV7M rack, Dial Isolator, and IMUX are included.
  • ISEC Cart System – A user can choose an ISEC bundled cart solution which includes a Cisco or Polycom codec. The roll-about console provides extra flexibility in location choice and includes a conveniently wall-mountable mode sign and a table-top switch for secure mode selection.
CyberFence CIP

Award-winning industrial security

CyberFence CIP (critical infrastructure protection) solutions are award-winning industrial firewalls designed to protect operational technology (OT) networks in new and legacy systems against cyber-events that impact safety and system availability. Our experience-based evaluations of end-to-end systems – from access control, surveillance to Layer 2/3 network security, malware protection, PLC security – inform our vulnerability assessments to establish security levels that assure secure operational efficiency and effectiveness.

Adaptable configurations

  • Industrial DPI Firewall with Layer 3 Encryption: EtherGuard
  • Industrial DPI Firewall with Layer 2 Encryption: DarkNode
  • High-speed Layer 2 Encryption: UltraCrypt
  • Industrial DPI Firewall: EtherWatch

Meeting industry and government standards

We design, build and deploy solutions that combine technology, policies and procedures to align risk with turnkey solutions that maximise systems spending while eliminating downtime due to breaches. When evaluating any cybersecurity solution, owners and operators of energy control systems are obliged to include North America Electric Reliability Corporation (NERC) compliance in the decision-making process. While many types of facilities are required to meet NERC standards, all principals in the industry should strive to comply for best security outcomes that assure potentially life-saving system stability.

The industrial difference

Embedded systems and associated devices that run critical operations are critical to managing automation and control systems. These networks are complemented throughout industrial facilities by the OT domain which is the front-facing edge that blends cyber components with physical devices to form complex networks whose operational integrity is paramount to human safety. As a result, there is increasing pressure within ICS organisations to allow IT departments to perform more cyber-related services in the ICS domain.

More about CyberFence CIP solutions

  • Approved by automation vendors and standards groups
  • Exceed NERC CIP, ISA IEC 62443 standards
  • Integrate into systems to enable globalisation
  • Offer real-time information flow for innovative business models
  • Migrate into legacy infrastructure networks to speed value-oriented deployments
  • Remote access support

Other Cyber capabilities

Sign up for download access

Please submit your details below to access our downloads.

I'm happy for you to contact me

View our privacy policy
Not now