Mobile Network Deployments
Combat zones and other temporary environments operate at a fast tempo and are ever changing, creating complex challenges for mobile network deployment. In most cases, all network transmissions needs to be secure, because the very nature of their mobility makes them more vulnerable to a security breach.
The INTERCEPTOR has been identified as a highly effective and affordable means to ensure fail-safe communication transfer in a war zone or mobile facility. Click here for a case study on an actual mobile space command control deployment.
When compared to encryption (the typical way networks are secured in this environment), INTERCEPTOR offers several significant advantages:
Lead time and installation
Typical lead-time for the INTERCEPTOR is four to six weeks vs. six months or more for encryption once COMSEC authorizations are approved. With the fast-paced expectations of a mobile deployment, this delay is unacceptable. The INTERCEPTOR is a non-COMSEC controlled, commercially available off-the-shelf (COTS) product and is a simple plug-and-play installation.
Ease of use
Type-I encryption requires extensive user management and configuration. INTERCEPTOR carries no such burden. Following installation, INTERCEPTOR is virtually maintenance free.
Furthermore, as an alarmed PDS, INTERCEPTOR is designed to detect movement caused by handling of the cables. It uses two or more fibers of the data cable being protected to make the entire length of the cable system, from the equipment room to the user-drop, a sensor. This patented monitoring technology makes it an ideal solution in a mobile environment where the physical site is often protected by guards and supported by engineers from a distance, essentially rendering the site unmanned.
No false alarms
With a network in a combat zone or other temporary site, the environment is often unknown and unpredictable. INTERCEPTOR has the unique ability to “learn” the environment and can distinguish between benign events and an actual security breach. In the case of a mobile deployment, it adjusts for random vibrations and transport factors, resulting in fail-safe, nuisance-free monitoring.
Bandwidth is another area in which INTERCEPTOR outperforms encryption. Traditional Type-I encryptors limit bandwidth to 100Mbps, creating bottlenecks. Newer encryptors provide up to 10Gbps, however the cost is much higher (see below). INTERCEPTOR in contrast does not process or touch data. As such, it has no impact on network bandwidth. Every fiber in the cable is available for secure transmissions with complete bandwidth utilization – up to 10 Gig and beyond.
Depending on their throughput speed, Type-1 encryptors cost a minimum of $9,000 each. Since one is required at each end of an encrypted circuit (copper or fiber pair), the total cost of a single protected circuit is at least $18,000. In the high density SIPRNet environment, encryption is a very expensive security method. Higher throughput (faster) encryptors, necessary to keep pace with the propensity for faster network transmission equipment, cost more (e.g. $19,000 each 1-gigabit, $35,000 each 10-gigabit). Thus, the cost for a single optical circuit, operating at 10 GB for example, is $70,000.
Conversely, INTERCEPTOR can protect that same circuit, as well as all the fibers in the cable for approximately $18,000.