Main.Products History

Hide minor edits - Show changes to markup

January 14, 2011, at 09:26 PM by 90.191.118.241 -
Changed lines 3-6 from:

nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.

NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.

to:

Thales for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.

InfoGuard, who provides secure communication solutions with link encryption for all possible network connection and protocol variations.

January 14, 2011, at 09:25 PM by 90.191.118.241 -
Changed line 34 from:
to:
February 12, 2010, at 04:15 PM by 193.40.0.188 -
Changed line 34 from:
to:
February 12, 2010, at 04:15 PM by 193.40.0.188 -
Changed lines 8-9 from:

nFast

nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.

to:

nFast

Thales's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.

Changed lines 12-13 from:

nForce

nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.

to:

nShield Solo

Thales's nShield Solo cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality. nShield is also the first HSM available for PCI-Express platform starting from August 2008.

Changed lines 16-17 from:

nShield

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality. nShield is also the first HSM available for PCI-Express platform starting from August 2008.

to:

nShield Connect

Thales's nShield Connect module is basically an nShield Solo made available over the network. This way a larger number of hosts can benefit from the secure key management.

Changed lines 20-21 from:

netHSM

nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.

to:

All Thales nShield series products use nCipher's Security World architecture which means that keys can be swapped between all of the different modules. It makes key management very simple as well as provides a powerful and easy way for future upgrades.


EtherGuard 1/10 Gbit/s

InfoGuard's EtherGuard product line is a layer-2 ethernet encryption solution which can be incorporated in almost any LAN topology. The appliance provides line-speed ultra low latency (<5Ás) strong encryption using AES (128 or 256 bit) encryption. This device is ideal for encrypting ethernet links between datacenters.

Changed lines 26-29 from:

All nCipher products use nCipher's Security World architecture which means that keys can be swapped between all of the different modules. It makes key management very simple as well as provides a powerful and easy way for future upgrades.


EtherGuard 1/10 Gbit/s

InfoGuard's EtherGuard product line is a layer-2 ethernet encryption solution which can be incorporated in almost any LAN topology. The appliance provides line-speed ultra low latency (<5Ás) strong encryption using AES (128 or 256 bit) encryption. This device is ideal for encrypting ethernet links between datacenters.

to:

Adva TDM
Deleted lines 28-30:

Adva TDM




August 11, 2008, at 10:10 PM by 128.141.129.180 -
Changed line 17 from:

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.

to:

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality. nShield is also the first HSM available for PCI-Express platform starting from August 2008.

August 01, 2008, at 12:22 PM by 194.204.14.110 -
Changed lines 30-31 from:

Multilink encryption

InfoGuard's Multilink/Multiprotocol encryption units provide line speed 10Gbit/s encryption of fiber and sonet links. Through a combined device of SonetGuard and ADVA TDM you can encrypt a number of SAN and ethernet links at the same time and pass the combined data along a 10Gbit/s fiber. This device is ideal for encrypting all traffic between two or more datacenters.

to:

Adva TDM
Changed lines 33-36 from:
to:

Multilink encryption

InfoGuard's Multilink/Multiprotocol encryption units provide line speed 10Gbit/s encryption of fiber and sonet links. Through a combined device of SonetGuard and ADVA TDM you can encrypt a number of SAN and ethernet links at the same time and pass the combined data along a 10Gbit/s fiber. This device is ideal for encrypting all traffic between two or more datacenters.


July 30, 2008, at 08:54 AM by 127.0.0.1 -
Changed line 31 from:

InfoGuard's Multilink/Multiprotocol encryption units provide line speed 10Gbit/s encryption of fiber and sonet links. Through a combined device of SonetGuard and ADVA TDM you can encrypt a number of SAN and ethernet links at the same time and pass the combined data along a 10Gbit/s fiber. This device is ideal for encrypting all traffic between two or more datacenters as it provides a combined unit for both SAN and ethernet encryption.

to:

InfoGuard's Multilink/Multiprotocol encryption units provide line speed 10Gbit/s encryption of fiber and sonet links. Through a combined device of SonetGuard and ADVA TDM you can encrypt a number of SAN and ethernet links at the same time and pass the combined data along a 10Gbit/s fiber. This device is ideal for encrypting all traffic between two or more datacenters.

July 30, 2008, at 08:51 AM by 127.0.0.1 -
Changed lines 26-27 from:

CryptoStor Tape 700

Neoscale's CryptoStor Tape 700 is a multi port encryption device which intercepts traffic going to tape, compresses and encrypts it based on predefined policies. This way the data lying on tape is always protected and can easily be transported between sites without fear of data theft.

to:

EtherGuard 1/10 Gbit/s

InfoGuard's EtherGuard product line is a layer-2 ethernet encryption solution which can be incorporated in almost any LAN topology. The appliance provides line-speed ultra low latency (<5Ás) strong encryption using AES (128 or 256 bit) encryption. This device is ideal for encrypting ethernet links between datacenters.

Changed lines 30-31 from:

CryptoStor FC disk

Neoscale's CryptoStor FC disk is a hardware security module which enforces a SAN level firewall with encryption to provide for secured data at rest in central storage. It provides in addition to policy based encryption also the ability to enforce data access policies at finer granularity than ordinary SAN switches do.

to:

Multilink encryption

InfoGuard's Multilink/Multiprotocol encryption units provide line speed 10Gbit/s encryption of fiber and sonet links. Through a combined device of SonetGuard and ADVA TDM you can encrypt a number of SAN and ethernet links at the same time and pass the combined data along a 10Gbit/s fiber. This device is ideal for encrypting all traffic between two or more datacenters as it provides a combined unit for both SAN and ethernet encryption.

Changed line 36 from:
to:
February 12, 2008, at 07:27 AM by 87.119.161.87 -
Changed lines 34-37 from:

CryptoStor SAN VPN

Neoscale's CryptoStor VPN is a hardware fiber encryption appliance. It is used to encrypt traffic on fiber between different sites. The performance of encryption is provided at line speed of 2Gbit/s.


to:
February 09, 2007, at 11:02 PM by 10.6.2.36 -
Changed line 12 from:

nForce
to:

nForce
Changed line 16 from:

nShield
to:

nShield
Changed line 20 from:

netHSM
to:

netHSM
Changed line 26 from:

CryptoStor Tape 700
to:

CryptoStor Tape 700
Changed line 30 from:

CryptoStor FC disk
to:

CryptoStor FC disk
Changed line 34 from:

CryptoStor SAN VPN
to:

CryptoStor SAN VPN
February 09, 2007, at 11:01 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 11:00 PM by 10.6.2.36 -
Changed lines 37-38 from:
to:
February 09, 2007, at 11:00 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
Changed line 12 from:

nForce
to:

nForce
Changed line 16 from:

nShield
to:

nShield
Changed line 20 from:

netHSM
to:

netHSM
February 09, 2007, at 10:58 PM by 10.6.2.36 -
Changed line 26 from:

CryptoStor Tape 700
to:

CryptoStor Tape 700
Changed line 30 from:

CryptoStor FC disk
to:

CryptoStor FC disk
Changed line 34 from:

CryptoStor SAN VPN
to:

CryptoStor SAN VPN
February 09, 2007, at 10:56 PM by 10.6.2.36 -
Changed lines 8-9 from:

nFast
to:

nFast
February 09, 2007, at 10:48 PM by 10.6.2.36 -
Changed lines 8-9 from:

nFast
to:

nFast
Changed lines 38-39 from:
to:
February 09, 2007, at 10:46 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:42 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:41 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:41 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:38 PM by 10.6.2.36 -
Changed line 8 from:

| nFast

to:

nFast
February 09, 2007, at 10:38 PM by 10.6.2.36 -
Changed line 8 from:

| nFast

to:

| nFast

February 09, 2007, at 10:37 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

| nFast

February 09, 2007, at 10:36 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:35 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:35 PM by 10.6.2.36 -
Changed line 8 from:

nFast
to:

nFast
February 09, 2007, at 10:33 PM by 10.6.2.36 -
Deleted line 11:
Changed lines 14-16 from:


to:




Changed lines 18-20 from:


to:




Changed lines 22-27 from:


All nCipher products use nCipher's Security World architecture which means that keys can be swapped between all of the different modules. It makes key management very simple as well as provides a powerful and easy way for future upgrades.

to:




All nCipher products use nCipher's Security World architecture which means that keys can be swapped between all of the different modules. It makes key management very simple as well as provides a powerful and easy way for future upgrades.

Changed lines 28-30 from:


to:




Changed lines 32-34 from:


to:




Changed lines 36-38 from:


to:




February 09, 2007, at 10:33 PM by 10.6.2.36 -
Added lines 10-14:





nForce

nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.

Changed lines 18-19 from:

nForce

nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.

to:

nShield

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.

Changed lines 23-24 from:

nShield

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.

to:

netHSM

nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.

Deleted lines 27-31:

netHSM

nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.

February 09, 2007, at 10:14 PM by 10.6.2.36 -
Added line 12:
Added line 17:
Added line 22:
Added line 27:
Added line 30:
Added line 35:
Added line 40:
Added line 45:
February 09, 2007, at 10:14 PM by 10.6.2.36 -
Changed lines 10-11 from:
to:


Changed lines 14-15 from:
to:


Changed lines 18-19 from:
to:


Deleted line 21:
Changed lines 28-29 from:
to:


Changed lines 32-33 from:
to:


Changed lines 36-37 from:
to:


February 09, 2007, at 10:13 PM by 10.6.2.36 -
Changed lines 11-16 from:
nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.
nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.
nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.
to:

nForce

nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.


nShield

nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.


netHSM

nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.


Changed lines 24-29 from:
Neoscale's CryptoStor Tape 700 is a multi port encryption device which intercepts traffic going to tape, compresses and encrypts it based on predefined policies. This way the data lying on tape is always protected and can easily be transported between sites without fear of data theft.
Neoscale's CryptoStor FC is a hardware security module which enforces a SAN level firewall with encryption to provide for secured data at rest in central storage. It provides in addition to policy based encryption also the ability to enforce data access policies at finer granularity than ordinary SAN switches do.
Neoscale's CryptoStor VPN is a hardware fiber encryption appliance. It is used to encrypt traffic on fiber between different sites. The performance of encryption is provided at line speed of 2Gbit/s.
to:

CryptoStor Tape 700

Neoscale's CryptoStor Tape 700 is a multi port encryption device which intercepts traffic going to tape, compresses and encrypts it based on predefined policies. This way the data lying on tape is always protected and can easily be transported between sites without fear of data theft.


CryptoStor FC disk

Neoscale's CryptoStor FC disk is a hardware security module which enforces a SAN level firewall with encryption to provide for secured data at rest in central storage. It provides in addition to policy based encryption also the ability to enforce data access policies at finer granularity than ordinary SAN switches do.


CryptoStor SAN VPN

Neoscale's CryptoStor VPN is a hardware fiber encryption appliance. It is used to encrypt traffic on fiber between different sites. The performance of encryption is provided at line speed of 2Gbit/s.

February 09, 2007, at 10:11 PM by 10.6.2.36 -
Changed lines 8-9 from:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
to:

nFast

nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.

February 09, 2007, at 10:10 PM by 10.6.2.36 -
Changed lines 8-9 from:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
to:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
February 09, 2007, at 10:06 PM by 10.6.2.36 -
Changed lines 8-9 from:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors.
Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
to:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
February 09, 2007, at 10:05 PM by 10.6.2.36 -
Changed lines 8-9 from:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
to:
nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors.
Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
February 09, 2007, at 10:02 PM by 10.6.2.36 -
Deleted line 23:
February 09, 2007, at 09:42 PM by 10.6.2.36 -
Added lines 7-24:

Most common products of interest are:

nCipher's nFast SSL accelerator card. This is the simplest hardware SSL accelerator card which comes in two flavors. Either a full scale SSL offload card which replaces a systems NIC and enables the full SSL load to be handled by the card or just an accelerator which takes care of the RSA ciphering/deciphering parts which are the most cpu consuming processes.
nCipher's nForce tamper resistant SSL offload card. This card adds to the nFast cards functionality by providing a tamper safe environment for the keys used in SSL handshakes.
nCipher's nShield cards are full scale hardware security modules which perform encryption/decryption operations as well as full scale key management. These are highly tamper resilient cards for all kinds of applications requiring secure key management and cryptographic functionality.
nCipher's netHSM module is basically an nShield made available over the network. This way a larger number of hosts can benefit from the secure key management.

All nCipher products use nCipher's Security World architecture which means that keys can be swapped between all of the different modules. It makes key management very simple as well as provides a powerful and easy way for future upgrades.

Neoscale's CryptoStor Tape 700 is a multi port encryption device which intercepts traffic going to tape, compresses and encrypts it based on predefined policies. This way the data lying on tape is always protected and can easily be transported between sites without fear of data theft.
Neoscale's CryptoStor FC is a hardware security module which enforces a SAN level firewall with encryption to provide for secured data at rest in central storage. It provides in addition to policy based encryption also the ability to enforce data access policies at finer granularity than ordinary SAN switches do.
Neoscale's CryptoStor VPN is a hardware fiber encryption appliance. It is used to encrypt traffic on fiber between different sites. The performance of encryption is provided at line speed of 2Gbit/s.
February 09, 2007, at 02:44 PM by 127.0.0.1 -
Changed line 8 from:
to:
February 09, 2007, at 02:43 PM by 127.0.0.1 -
Changed line 8 from:
to:
February 09, 2007, at 02:27 PM by 10.6.2.36 -
Changed line 8 from:
to:
February 09, 2007, at 02:26 PM by 10.6.2.36 -
Changed lines 7-9 from:

to:
February 09, 2007, at 02:22 PM by 10.6.2.36 -
Added line 7:
February 09, 2007, at 02:21 PM by 127.0.0.1 -
Changed lines 3-11 from:
nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.
NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.
test tekst
on two rows
or three

just one line
to:

nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.

NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.


February 09, 2007, at 02:20 PM by 127.0.0.1 -
Changed lines 10-12 from:

or three || (:div style="vertical-align: middle;":) just one line (:divend:) ||

to:

or three ||
just one line ||

February 09, 2007, at 02:00 PM by 127.0.0.1 -
Changed lines 10-12 from:

or three || (:div style="vertical-align: middle;":)just one line(:divend:) ||

to:

or three || (:div style="vertical-align: middle;":) just one line (:divend:) ||

February 09, 2007, at 01:59 PM by 127.0.0.1 -
Changed line 10 from:

or three || just one line ||

to:

or three || (:div style="vertical-align: middle;":)just one line(:divend:) ||

February 09, 2007, at 01:56 PM by 127.0.0.1 -
Changed line 7 from:
to:
February 09, 2007, at 01:55 PM by 127.0.0.1 -
Changed line 7 from:
to:
February 09, 2007, at 01:52 PM by 127.0.0.1 -
Changed lines 8-10 from:
test tekst\\ on two rows\\ or threejust one line
to:
test tekst
on two rows
or three
just one line
February 09, 2007, at 01:52 PM by 127.0.0.1 -
Added lines 6-8:
test tekst\\ on two rows\\ or threejust one line
February 09, 2007, at 01:45 PM by 10.6.2.36 -
Changed lines 3-5 from:

%lfloat text-align=center margin-top=5px margin-right=25px margin-bottom=5px margin-left=25px% nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.

to:
nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.
February 09, 2007, at 01:44 PM by 10.6.2.36 -
Changed lines 3-4 from:
nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.
to:

%lfloat text-align=center margin-top=5px margin-right=25px margin-bottom=5px margin-left=25px% nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.

February 09, 2007, at 01:42 PM by 10.6.2.36 -
Changed lines 2-6 from:

For secure solutions we provide products from two of our partners. nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption. NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.

(:table border=0 width=100% align=center:) (:cell valign=middle:) (:cell valign=middle:)

to:

For secure solutions we provide products from two of our partners.

nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption.
NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.
February 09, 2007, at 01:38 PM by 127.0.0.1 -
Changed line 4 from:

(:table border=0 width=100%:)

to:

(:table border=0 width=100% align=center:)

February 09, 2007, at 01:38 PM by 127.0.0.1 -
Changed lines 4-5 from:
to:

(:table border=0 width=100%:) (:cell valign=middle:) (:cell valign=middle:)

February 09, 2007, at 01:33 PM by 127.0.0.1 -
Changed lines 3-4 from:
to:
February 09, 2007, at 01:33 PM by 127.0.0.1 -
Changed line 3 from:
to:
February 09, 2007, at 01:31 PM by 127.0.0.1 -
Deleted line 3:
February 09, 2007, at 01:29 PM by 127.0.0.1 -
Added line 3:
Changed line 5 from:

| | |

to:
February 09, 2007, at 01:28 PM by 127.0.0.1 -
Changed lines 3-4 from:
to:

| | |

February 09, 2007, at 01:27 PM by 127.0.0.1 -
Changed line 4 from:
to:
February 09, 2007, at 01:25 PM by 127.0.0.1 -
Added lines 1-4:

Security products:

For secure solutions we provide products from two of our partners. nCipher for cryptographic equipment and software from SSL accelerators to hardware security modules as well as database encryption. NeoScale who provides secure storage solutions with both encrypted content and link encryption between different storage sites.