High-security encryption for mobile phones, all integrated in a microSD cardCrypto Desktop HC-9300
The ultimate encryption platform with high-security applications for voice, fax and filesCrypto Mobile Client HC-7835
Secure connections in public IP networksCrypto Link HC-8682 100G
Highest security with maximum performance of 100 Gbit/sCrypto HC-8644 IP VPN
IP VPN encryption unit designed for large data transfersIP VPN Encryption HC-7845 Gigabit Version
Secure broadband connections in public
Secure broadband connections in public
Enables absolutely secure virtual private networksRugged Network Encryption Platform HC-8224 100M
Encryption Platform for Ethernet and IP VPN ApplicationsEthernet Encryption HC-8556 10G Multipoint
The world's fastest Ethernet encryptionEthernet Encryption HC-8552 1G Multipoint
Universal protocol for encrypted LAN/MAN/WAN networksEthernet Encryption HC-8550 100M Multipoint
High-security system for protecting your sensitive information in the networkLink Encryption Ethernet HC-8555 10G
10 Gb/s encryption output for point-to-point connectionsLink Encryption Ethernet HC-8551 1G
1 Gb/s encryption output for point-to-point connectionsSONET/SDH Encryption HC-8546
For backbone networks with huge bandwidths up to 10 Gb/sSONET/SDH Encryption HC-8544
High-security encryption for SONET/SDH at full wire speedMultiCom Radio Encryption HC-2650
Universal encryption platform for the protection of all radio and military IP networksMessenger for MultiCom Radio Encryption HC-2650
Secure messaging with standard e-mail graphical user interface over radioSECOS®
Secure frequency hopping system for VHF/UHF radio communicationsMultiCom Radio Encryption HC-2605 Terminal
Secure voice and chat communication over radio all the way to the tactical levelPSTN Encryption HC-2203
Proven and easy-to-use product for secure phone calls
PDH Encryption HC-8510 E1
Complete protection of data and information in a PDH-E1 applicationDeployable Mobile Office
Compact SatCom solution for remote operationSecurity Management Centre SMC-1100
Computer-based security management centre for all security and monitoring tasksCrypto Management Suite CMS-1200
Comprehensive management of all configuration settings for Crypto products.
Uniform encryption for (nearly) all applications.
Data streams protected, no matter what the topology.
High-security protection for ultra-modern radio communication.
No risk of eavesdropping – no matter where you call from.
SECOS® (Secure EECM Communication System) efficiently satisfies the requirements of tomorrow for secure radio communication on the battlefield.
Fax technology is as simple and still popular – but also prone to unauthorised access .
Editing, saving or e-mailing sensitive data on a PC is dangerous without appropriate protection.
Crypto cServices for all project phases
The Crypto AG offers customer-specific information security solutions that combine the most modern technology with state-of-the-art cryptography, all implemented seamlessly into your ICT environment and supported throughout the entire life cycle. The Crypto cServices are tailored specifically to meet your needs and goals.
An investment in the future – you benefit from an autonomous, long-lasting and highly available communication infrastructure with state-of-the-art technology.
Crypto cSeminars 2017
The Crypto cSeminars are aimed at special security personnel who are responsible for information security in companies and organisations. Experienced specialists convey in-depth knowledge about Information Security, cyber crime and cryptography. In the age of digitalisation, solid specialised knowledge about cyber defence is crucial. The Crypto cSeminars will provide participants with this valuable knowledge to comprehensively shield sensitive information and ICT infrastructures in their companies.
The Crypto AG is characterized by its extensive expertise in the field of information security solutions and knows the current challenges in cyber defence.
The Crypto cSeminars are open to the public and are held at the Crypto Academy in Steinhausen, Zug. The seminars are conducted in English and last for one week.
Participants will be introduced to a working model of Information Security which they can apply to their own organisation. Information is made available in a consistent tutorial structure which alternates theory, practice and discussion. They will receive in-depth information on the latest developments in threats and defence methods.
Information security professionals, managers and users of IT facilities
- 13 to 17 March 2017
- 2 to 6 October 2017
Participants will learn to examine the technological landscape under their charge for any possible vulnerabilities and which process to use to identify, document and remedy the weak points. This process will be integrated into the technical management process framework, specifically in relation to the patch management process. This will enable vulnerabilities to be identified at regular intervals – and risks will be kept at the lowest possible level.
Information security professionals, especially system security administrators, network managers, firewall operators, etc.
- 20 to 24 March 2017
- 9 to 13 October 2017
Participants will gain solid and up-to-date information on basic theories of encryption methods and technologies. Far from being generic and academic, this knowledge is geared towards the technical and strategic requirements for encryption in the authorities environment.
Information security professionals, in particular encryption key managers, network administrators and system integrators
- 27 to 31 March 2017
- 16 to 20 October 2017
Continuity, precision, trust and independence
Crypto AG has been a leader in information security for more than 60 years. The globally active Swiss company develops highly precise and individually adaptable security solutions and serves as a reliable partner to its customers. As a legally and financially independent entity, Crypto AG guarantees its customers maximum control over their security systems.
Integrated expertise for exclusive security.