Thales Trusted Cyber Technologies, a trusted U.S. based source for cyber security solutions, today announced that it has received United States Department of Defense Information Network Approved Products List (DoDIN APL) Approval for Thales CN Series Network Encryptors version 5.1.
Thales CN Series Network Encryptors are stand-alone appliances that deliver robust encryption and FIPS 140-2 Level 3 tamper-resistant key management capabilities. Thales CN Series Network Encryptors deliver maximum uptime in the most demanding, performance intensive environments and offer flexible, vendor agnostic interoperability. Transforming the network encryption market, CN Series Network Encryptors are the first to offer Transport Independent Mode (TIM) network—layer independent (Layer 2, Layer 3, and Layer 4) and protocol agnostic data in motion encryption.
The CN Series Network Encryptors appear on the DoDIN APL list as Fixed Network Elements. The approved products include:
- CN9120 Network Encryptor
- CN6100 Network Encryptor
- CN6010 Network Encryptor
- CN6140 Multi-Link Encryptor
- CN4020 Network Encryptor
- CN4010 Network Encryptor
The DoDIN APL, maintained by the Defense Information Systems Agency (DISA), outlines the products that have been certified for use on Department of Defense networks. DoDIN APL certification effectively gives listed products DISA’s seal of approval and signifies the products have completed Interoperability (IO) and Information Assurance (IA) certification. This certification is also meaningful to intelligence and civilian government agencies.
For more information on Thales Trusted Cyber Technologies CN Series Network Encryptors visit, www.thalestct.com/network-encryption.
ABOUT THALES TRUSTED CYBER TECHNOLOGIES
Thales Trusted Cyber Technologies, a business area of Thales Defense & Security, Inc., protects the most vital data from the core to the cloud to the field. We serve as a trusted, U.S. based source for cyber security solutions for the U.S. Federal Government. Our solutions enable agencies to deploy a holistic data protection ecosystem where data and cryptographic keys are secured and managed, and access and distribution are controlled.
For more information, visit www.thalestct.com