StealthWAN
Make your network endpoints invisible with the StealthWAN obfuscation capability. Secure wide area network communications with industry leading encryption and secure IoT & OT devices from external threats.
StealthWAN
StealthWAN makes your systems invisible to the rest of the world allowing you to securely expand your operations to the extreme network edge.
✓ STEALTH Network Perimeter
✓ World Class Encryption
✓ Remote Certificate Management
✓ Seamless Network Failover
✓ Zero Hands Deployment
✓ STEALTH Network Perimeter
✓ World Class Encryption
✓ Remote Certificate Management
✓ Seamless Network Failover
✓ Zero Hands Deployment
Solution Architecture
StealthWAN Provisioner
StealthWAN Manager
StealthWAN Server
Provides centralized PKI management and Stealth Security for all interconnected systems. The server is installed in the datacentre and hosts the VPN server to which all clients connect in order to create the Stealth network.
StealthWAN Client
Provides autonomous end-point network connectivity and resilience. The client connects to the server in a client-server model to create the Stealth network. StealthWAN Clients are also used for secure connectivity of remote sites.
StealthCloud
Wide Area Network Encryption
Mitigating risks associated with network infrastructure and service providers, the StealthWAN solution encrypts network data whilst making endpoints impervious to external attacks. Combined with the unique hands-off-install, the solution is a rapidly deployable, highly secure WAN Encryption solution.
Greatly increase the security of your network perimeter using StealthWAN to obfuscate your Wide Area Network (WAN) from external threats whilst encrypting all communications between Head Office, Branches and Internet of Things (IoT) devices.
Features
- Secure communications platform
- AES 256, TLS 1.2, SHA512 Encrypted links
- Integrates into existing Certificate Authorities
- Resilient connectivity through multiple MNOs
- Central configuration & policy management
- Automated deployment systems
- Patented STEALTH security offering
- Can be customised based on requirements
- Supports dynamic routing protocols
- Software and Hardware solutions
- Stateful firewall
Why StealthWAN
Stealth
Choose between Version 1 and Version 2 of the patented STEALTH security offering.
Encryption
Military grade encryption with TLS 1.2 encapculation to protect information at a “Top Secret” level.
Compliance
Designed for PCI DSS v3.2 and NIST compliance.
Service Reliability
Integrates into all major technology vendors, monitoring solutions and certificate authorities.
Reduced Networking Costs
Leveraging the internet as a transport layer, a company can mitigate the requirement for expensive MPLS and APN network contracts.
Deployment
Rapid/Automated deployment model to ensure your new stealth network is seamlessly integrated with your current network infrastructure.
Cost
Lower Total Cost of Ownership than other secure crypto communications solutions.
Skills and Customizations
No requirement for rare or expensive skills in administration or when requiring customization based on your specific requirements.