Protect sensitive data in motion with Colt Network Encryption services
Effective network security relies on multiple layers of defense, not just at the edge and core of the network but also along the network path. While much of the focus on security is on users and applications, protecting in-flight data as it travels across the network is a critical component of a holistic security strategy. Colt Network Encryption Services ensure secure connectivity, so whichever the network layer you want to secure, we have an end-to-end encryption service to suit your needs.
Network encryption types
Optical Encryption is available as an integral part of Wave and Private Wave services. Fully transparent to Ethernet, IP and other network protocols, it provides the very highest levels of performance and security in combination.
Optical Encryption is inherent to the core service, and is embedded in the optical hardware for maximum security and performance.Any traffic that has to traverse the optical backbone becomes encrypted by default, reducing the risk of sensitive traffic leaving the enterprise unprotected, providing always on end-to-end encryption.
Operating at Layer 1 of the OSI stack, optical encryption is efficient and scalable. Implemented on the OTN signal layer, the full data payload remains available without latency degradation
Colt’s Network Encryption solution offers FIPS-certified AES-256 encryption with standards-based authentication mechanisms such as X.509 digital certificates, enabling operational simplification with seamless integration into enterprise Public Key Infrastructures
Customers may choose to manage their own encryption keys or request Colt to do so as an additional service option. Flexibility over the siting of Colt’s optical hardware platforms, including within customer-secured environments, enables the Colt solution to be tailored to the customer’s security policies
Colt Voice Encryption end-to-end encryption solution that provides additional security for your voice services, including both SIP Signalling encryption and audio encryption.
SIP encryption is offered using SIP Transport Layer Security (TLS) encryption, with mutual authentication, and supports both Asymmetric Encryption (AES) and Triple Data Encryption (3DES)
Colt Audio Encryption secures the audio stream with SRTP (Secure Real Time Protocol) media encryption, which is a IETF cryptographic protocol used to provide secure communications over an untrusted network. It provides confidentiality and message integrity for media streams.
The expansion in the volume of sensitive information being stored and transmitted by many organisations shows no sign of abating, whilst the Internet and cloud computing present new
challenges. This has led to new risks, whilst data breaches – both accidental and malicious – have grown in frequency, severity and business impact. Security breaches impact network availability, which results in disruption to normal business activity and significant business cost. A loss of customers affects revenues directly and reputational damage can seriously affect the customer retention and growth prospects of a business.
Physically securing networks can be extremely challenging, and even if a rack or room can be secured, data itself must traverse disparate systems and locations. In Europe, the General Data Protection Regulation (GDPR) came into effect in May 2018, requiring all companies that process personal data to comply with its provisions or face stiff penalties in the event of a data breach. And in the US, 47 states now have laws requiring notification of data breaches involving personal information. 29 states have laws that explicitly require entities to destroy, dispose, or make personal information unreadable/ undecipherable. As global regulators increasingly address the pressing need for information security, businesses need to adopt a coherent and holistic strategy across their technology infrastructure.
Colt’s optical encryption solution provides the necessary flexibility to allow customers to implement and comply with specific security policies and requirements. Customers can have secure and exclusive access to the encryption configuration and for management of their encryption keys. The encryption hardware is customer-dedicated, and can be located in the customer’s own secured rack environment to ensure compliance with their broader corporate security strategy.
Our services have been recognised with a string of Metro Ethernet Forum awards for 12 years, including Best Wholesale Service Provider of the Year, Best Retail Service Provider of the Year and the Award for Service Innovation. Our optical Ethernet services are MEF CE 2.0 certified.
- NIST compliant Advanced Encryption Standard (AES) -256
- FIPS compliant (140-2 or above)
- Integration with existing enterprise Public Key Infrastructures using X.509 certificate-based authentication
- Support for RSA or ECC digital certificates and algorithms
- Diffie-Hellman secured key negotiation (including Elliptic Curve Cryptography)
- Full data throughput at up to 100Gbps
- Optical Ethernet, Fibre Channel, WAN PHY, SDH/SONET and OTU presentations
- Enhanced security features - two distinct key sets for authentication and data encryption functions
- Fast encryption key rotation interval of just seconds
- Secure authentication and key management via an integrated management tool
Why choose a Colt encryption service?
Find out more about our Encryption services
Learn how to prepare your business for the hybrid workforce and implement a successful digital transformation strategy.
With the average cost of a data breach reaching $3.92 million, and DDoS attacks increasing by 967% this year alone, there’s never been a more important time to secure your network.
Leading provider of medical devices in the global healthcare sector chooses Colt´s cloud-first strategy to reduce TCO of their IT, increased employee productivity, optimised application performance and delivered improved flexibility and security
Global and industry DDoS attack trends, as per the NETSCOUT Threat Intelligence report, October 2020 The need to adopt advanced and automated DDoS technology to protect your company against continuous security threats Recommendations for organisations to operate and protect servers and network against attack vectors and behaviours Watch on-demand today. Watch on-demand Speakers Kirill…
In collaboration with Ciena we explore best practice examples on how to protect your network and how to apply next-gen architecture and security practises to enable increased working from home.
New research has found that security remains at the top of IT priority lists in 2020, followed by adding Artificial Intelligence (AI) or Machine Learning (ML) and migrating to the cloud. 77% of IT decision makers said that improving security is one of their biggest priorities for 2020, with cloud migration and adding AI joint…
Colt Technology Services today has announced that cryptocurrency exchange service operator BITPoint Japan Co., Ltd., selected Colt’s highly secure and…