A common practice for protecting classified networks is to utilize NSA approved Type-1 encryption devices within the network. However, there are several disadvantages associated with the use of Type-1 encryption such as:
- high cost,
- network bandwidth restrictions,
- un-acceptable lead-times to acquire equipment and
- cumbersome encryption-key management processes
Transitioning from encryption to an Alarmed PDS (APDS) such as INTERCEPTOR provides a quick way to upgrade performance and security, while reducing long-term costs.
Similar to SIPRNet tunneling across campus area networks with network encryptors, INTERCEPTOR can be installed on existing NIPRNet cables using spare fibers to create a protected sub-unit that can then be used to tunnel SIPRNet traffic at speeds that are unconstrained (ex: 10 Gig and beyond) at a fraction of the cost. Once INTERCEPTOR is used to monitor an individual sub-unit of a cable, all of the fibers in that cable are protected cable and can be used for SIPRNet traffic, unlike encryption, which requires an individual encryptor for each pair of transmitting fibers. This drastically reduces the cost per port for a deployment.
An operating base located in Africa, serves as the hub of a network of American drone bases in eastern Africa. Drone operations rely heavily on real-time video transmissions – demanding constant high bandwidth availability from the network.
The 10GBS network installed at this base was being secured with Type-1 Encryption devices designed for gigabit network speeds, due to cost and availability constraints associated with 10G encryptors. As such, the network’s bandwidth was typically degraded to 1 Gigabyte or less creating issues associated with video transmissions necessary for the completion of the base’s mission.
The command changed their security strategy from encryption to Alarmed PDS and installed NIS’s INTERCEPTOR solution throughout the base. The solution provided the base with access to the full bandwidth capabilities of the network. In addition, the burdensome processes associated with encryption management were eliminated, giving base personnel time back to spend on other mission requirements.