ENCRYPTION

STORED DATA AND INFORMATION IN TRANSIT

Integrated encryption systems uniquely designed to compliment our client's existing systems and operational environment.  

LAYERED SECURITY

TOTAL CONTROL

END-TO-END ENCRYPTION 

Secure email, instant messaging, file sharing, VoIP and voice recording . Encryption is performed in a device-to device manner encrypting before sending and only decrypting once received. Data is never decrypted during transfer. Encryption keys are unique to the devices communicating securely. 

ENCRYPTED STORAGE 

Full disk encryption- securing data files, operating systems and software applications. 

SECURE HARDWARE

Military grade encrypted hardware solutions.

 

INDUSTRY LEADING ALGORITHMS  

AES symmetric algorithms supporting 128, 192 and 256 bit encryption . 

ONE- TIME ENCRYPTION KEYS 

Communication is protected by a unique one-time encryption key generated during initial communication establishment. Each communication, even between the same two users has its own unique unpredictable encryption key which is destroyed when communication ends. 

PRIVACY

Systems do not require any personal data such as name, address, number and location.

COMMUNICATIONS
SECURITY & ENCRYPTION
SPECIALISED SOLUTIONS
THREAT DETECTION & PREVENTION 
TRAINING 
PROGRAMS

SPECIALISED TECHNOLOGIES AND SERVICES(PTY)LTD.