Network Encryption

Network encryption services

Download datasheet

Protect sensitive data in motion with Colt Network Encryption services

Effective network security relies on multiple layers of defense, not just at the edge and core of the network but also along the network path. While much of the focus on security is on users and applications, protecting in-flight data as it travels across the network is a critical component of a holistic security strategy.

Colt Network Encryption Services ensure secure connectivity, so whichever the network layer you want to secure, we have an end-to-end encryption service to suit your needs.

Explore network encryption features

By using Colt for both Internet access and cyber security services, we have enabled stability in our online trading system while significantly reducing TCO.

Mr. Takahiro Yamazaki & Ms. Tomomi Takahashi Systems Engineering, Infrastructure Team, au Kabucom Securities Co

Why choose Colt Network Encryption?

  • Always on

    Encryption is inherent to the core service, embedded in the optical hardware for maximum security and performance. Any traffic that has to traverse the optical backbone is encrypted by default.

  • Wire speed

    Operating at Layer 1 of the OSI stack encryption is efficient and scalable. Implemented on the OTN signal layer, the full data payload remains available without latency degradation.

  • Best-in-class

    FIPS-certified AES-256 encryption with standards-based authentication mechanisms such as X.509 digital certificates, enabling operational simplification with seamless integration into enterprise Public Key Infrastructures.

  • Flexible deployment

    Dedicated optical encryption hardware can be located in customer-secured environments in order to meet corporate security policies requirements.

  • Flexible management

    Customers can manage their own encryption keys and configuration according to their own standards, or can request Colt to do so as an additional service option.

  • Unlimited bandwidth

    Bandwidth options from 1Gbps to 100Gbps, with support for all major optical presentations including Ethernet, Fibre Channel, OTU2 and OTU4.

Questions? We're here to help.

Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.

Network Encryption explained

  • Effective network security relies on multiple layers of defense, not just at the edge and core of the network but also along the network path. While much of the focus on security is on users and applications, protecting in-flight data as it travels across the network is a critical component of a holistic security strategy.

    Network encryption provides this end-to-end, secure connectivity, regardless of the network layer you want to protect.

  • The expansion in the volume of sensitive information being stored and transmitted by many organisations shows no sign of abating, whilst the Internet and cloud computing present new challenges. This has led to new risks, whilst data breaches – both accidental and malicious – have grown in frequency, severity and business impact. Security breaches impact network availability, which results in disruption to normal business activity and significant business cost. A loss of customers affects revenues directly and reputational damage can seriously affect the customer retention and growth prospects of a business.

    Physically securing networks can be extremely challenging, and even if a rack or room can be secured, data itself must traverse disparate systems and locations. In Europe, the General Data Protection Regulation (GDPR) came into effect in May 2018, requiring all companies that process personal data to comply with its provisions or face stiff penalties in the event of a data breach. And in the US, 47 states now have laws requiring notification of data breaches involving personal information. 29 states have laws that explicitly require entities to destroy, dispose, or make personal information unreadable/ undecipherable. As global regulators increasingly address the pressing need for information security, businesses need to adopt a coherent and holistic strategy across their technology infrastructure.

  • Colt has used encryption on the IP layer for some time using IPSec network protocol, but IPSec has limitations. It is quite costly at high bandwidths and doesn’t scale very well in terms of performance. It can also add delay.

    We can now provide end to end encryption at line rate – 100 Meg, 1G and 10G – it doesn’t impact the performance and the throughput of the service.

  • Ethernet line encryption uses ADVA technology. More information can be found here and here.

  • Yes. Colt’s network encryption services protect optical and voice services with end-to-end encryption, this includes Ethernet Line, Wave, Private Wave, IP VPN and Voice.

    Colt’s Voice Encryption provides additional security for voice services, including SIP Signalling Encryption and Audio Encryption.

    SIP encryption is offered using Transport Layer Security (SIP-TLS) encryption, with mutual authentication, and supports both Asymmetric Encryption (AES) and Triple Data Encryption (3DES)

    Colt Audio Encryption protects the audio stream with SRTP (Secure Real Time Protocol) multimedia encryption, which is an IETF cryptographic protocol used to secure communications over an insecure network, ensuring the confidentiality and integrity of messages in multimedia streams.

Need more information?

Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.

Download datasheet