Encrypted Communications Hardware

MOBILE, WIRED & WIRELESS ENCRYPTION

Encrypted Communication Devices

ENCRYPTION IS AN INTEGRAL PART OF DATA & COMMUNICATION SECURITY

If your data isn’t encrypted, then there is an inevitable risk to reputation and even national security.

At ACC, we understand cryptography very well. Our encryption solutions for enterprises, governments and even individuals ensuring protection from hostile government surveillance, criminal eavesdropping, industrial espionage and data theft.

ACC can help deploy enterprise managed encryption solutions to manage endpoints, mobile devices, landlines, network encryptors and also portable encrypted hard drives which can be used to physically transport confidential data in offline mode with access only granted by two or more users.

Get in touch to find out more.

ENCRYPTED MOBILE COMMUNICATION

ACC can help provide a dedicated Secure Voice over IP (VoIP) and Instant Messaging (IM) solution suite to ensure complete privacy for enterprise and government communication. It comprises of front-end client solution and backend VoIP/IM system to provide a complete secure communication over IP network. It is designed with true end-to-end encryption.

The solution suite consists of secure Android App with secret credentials stored in a cryptographic microSD card. It is designed for mobile user with Android smartphone connecting to backend secure VoIP / IM system via 3G/4G.

Additional hardware includes rack mounted IP Encryptors and Server software.

Features

  • End To End Encryption for Voice & Messaging

  • Layer 3 IPSec Security

  • AES Algorithm

  • SHA & IKE Protocols for Integrity

  • Excellent Voice Quality

  • PnP & Dynamic IP Addressing

  • Encrypted Storage For Contacts

GET IN TOUCH

ENCRYPTED LANDLINE

ACC can help provide a dedicated Secure Voice over IP (VoIP) and Instant Messaging (IM) solution suite to ensure complete privacy for enterprise and government communication. It comprises of front-end client solution and backend VoIP/IM system to provide a complete secure communication over IP network. It is designed with true end-to-end encryption.

The solution suite also consists of Secure Landline Phone designed for office environment with a seperate hardware element that is tamper resistant connecting to backend VoIP system via RJ45 to the internet.

Additional hardware includes rack mounted IP Encryptors and Server software.

Features

  • End To End Encryption

  • Layer 3 IPSec Security

  • AES Algorithm

  • SHA & IKE Protocols for Integrity

  • Excellent Voice Quality

  • PnP & Dynamic IP Addressing

  • Encrypted Storage For Contacts

GET IN TOUCH

WIRELESS IP ENCRYPTOR WITH 2-FACTOR AUTHENTICATION

ACC offers portable IP encryptor that enables the user to leverage on public Ethernet/IP network to connect to their corporation VPN gateway securely. The device employs AES algorithm for encryption and SHA + IKE for integrity protection and keys derivations & authentications.

The remarkable characteristics of VPNCrypt is its small size which enables it to be carried anywhere. It’s convenience is further extended by its ability to switch between Wires & WiFi connection. This WiFi feature is capable of ensuring a secure connection link even in public WiFi networks.

With a built-in keypad, the device also first of its kind portable encryptor that incorporates Two Factor Authentication for access control to this device.

Features

  • Supports Wired & WiFi Connections

  • 30 Mbps Throughput

  • Slim & Compact

  • Supports 10 concurrent IPSec tunnels.

  • Built-in Keypad to support 2FA

  • Also Works on Public WiFi which requires pre-registration.

GET IN TOUCH

Specifications

– Trusted port: 2 x Ethernet RJ45 10/100 Mbps auto-sensing port
– External port: 1 x Ethernet RJ45 10/100 Mbps auto-sensing port and Wifi port 802.11 b/g/n
– Comes with management interface: 1 x Ethernet RJ45 10/100 Mbps auto-sensing port
– IP Security/Encapsulating Security Protocol
– Support Layer 2 and Layer 3 encryption capability
– IP Compression
– QoS support
– Traffic flow confidentiality
– RSA Public Key Signature (2048 bit)
– Support Internet Key exchange (IKE v2)
– DH supports up to 8192 bit
– ECDH support up to P-521 bit (Optional)
– Group Transport Protection: The device has the option of providing encryption and data integrity
– AES-CBC (256 bit)
– HMAC-SHA1
– HMAC-SHA2 (256, 384, 512 bit)
– Zero-loss encrypted throughput up to 30Mbps (depending on IP packet size and used encryption mode)
– Support 10 concurrent IPSec tunnels
– Dimensions: 90mm(W) x 150mm(L) x 19mm(H)
– Storage Temperature: -20ºC to 70ºC
– Operating Temperature: 0ºC to 40ºC
– Humidity: Relative 10%-95%, non-condensing
– Power adaptor: 100 – 240VAC 50/60Hz, 9VDC Output, 2.5A
– Battery Pack: 9VDC, 3600mAH (Optional)
– EMC/EMI: FCC Part 15 Class B
– Supports customized algorithm loading feature

Ready to Talk?

LOOKING TO PURCHASE STAND ALONE DEVICE OR ENTERPRISE SOLUTION?

Contact Us