Crypto Mobile Client HC-7835

For travelling ambassadors, members of governments, senior civil servants, military commanders and managers, remote access via laptop/notebook to a central infrastructure and the data of their organisations is an integral part of daily work. In such cases, data exchanges can easily be tapped by unauthorized parties because they are generally conducted over an Internet access. This risk can be avoided by setting up a safe, encrypted connection (IP VPN Tunnel).

E-mails can be encrypted with the Mobile Client using a message encryption application and sent to communication partners over a regular e-mail infrastructure with end-to-end protection. Local security is provided by a protected storage unit in the HC-7835, where data can be stored transparently. The data is encrypted automatically and then decrypted when picked up or opened. Further, users go to an integrated write-protected storage unit and boot their own operating system onto their own computer. The operating system is immune to tampering and therefore free of viruses or Trojans. A file encryption application lets users encrypt sensitive data and save it on their computer or other storage media.

The IP VPN Client HC-7835 provides the perfect technical base for mobile users. Small and simple to operate, this unit can be utilised in multi-location operation with virtually any laptop or PC.

 

Merkmale

  • Small, mobile unit for high-performance personal use in conducting secure data transmissions over IP networks.
  • All applications, e.g. e-mail, VoIP, data or video, are protected.
  • Easy to connect to notebooks or PCs (USB/Ethernet), regardless of operating system.
  • Diverse possibilities for connecting to mobile networks, hotspots and satellite networks (Ethernet, WiFi, Bluetooth).
  • Usable in plug-and-play operation following basic configuration.
  • Also offers local security with access protection and encrypted storage.
  • Encryption in tamper-proof hardware module with your own secret algorithm.

Applikationen

IP VPN

High-security encryption of information being exchanged between two locations.

> More
IP VPN

IP VPN encryption encrypts all information being exchanged between two locations over public and private networks. The tunnel mode approach is used to ensure maximum confidentiality, authenticity and integrity of the data.

IP encryption encrypts all types of communication such as e-mails, VoIP, data or video to the highest standards, thus rendering them unreadable in the network for unauthorised parties. IP VPN encryption is compatible with all IP encryption units up to a transmission rate of 1 Gbps.

File Encryption

Full protection for files, no matter how they are formatted.

> More
File Encryption

With Crypto File Encryption, files can be saved in encrypted form on the computer or another external data medium. The security procedure for users is quite simple. Following authentication, they can use the browser to encrypt the files or convert them back to plain text.

Mail encryption

Sending encrypted messages.

> More
Mail encryption

Crypto e-mail encryption is an application for sending encrypted messages. Users can take encrypted files directly from the selected storage medium and attach them to e-mails for secure transport.

Security Management

The Security Management enables the complete administration of the encryption units including their configuration parameters.

 

> More
Security Management

The encrypted management messages can be transferred to the Crypto units on-line or off-line. All sensitive data in the management database is stored encrypted. Monitoring of the encrypted network is provided with detailed status reports.

Storage

Encrypted data and information storage systems outside your laptop for use at the office and when travelling.

> More
Storage

The task of a storage area network is to store and manage large data quantities efficiently. Efficient in this case means the storage area network has to transfer data fast and expand storage capacity easily and dynamically to meet growing requirements. It has to make data available during backup and resume normal operation as quickly as possible following data restoration.

Kontakt

Continuity, precision, trust and independence

 

Crypto International AG has been a leader in information security for more than 60 years. The globally active Swiss company develops highly precise and individually adaptable security solutions and serves as a reliable partner to its customers. As a legally and financially independent entity, Crypto International AG guarantees its customers maximum control over their security systems.

Integrated expertise for exclusive security.

 

Crypto International AG, Switzerland +41 41 749 77 22
Contact
I have read the data protection declaration and agree to it.

* Required fields
** Please enter either your E-mail or your phone number.