Home   About Us   Services   Solutions   Support            
 
Power Protection
Data
Networking
Security
 
Overview
Importance of Security
Threats to Data
Who are the Enemies?
What can the Enemies do?
Services
Assessment
Audit
Penetration Test
Security Policies
Security Tools
 
Overview
Bulletproof Virus Protection!
Firewall
Intrusion Detection
VPN
Access Control
Encryption
Network Scanning
Wireless
E-business
  Encryption
Encryption technology ensures that messages cannot be intercepted or read by anyone other than the authorized recipient. Encryption is usually deployed to protect data that is transported over a public network and uses advanced mathematical algorithms to “scramble” messages and their attachments. Several types of encryption algorithms exist, but some are more secure than others. Encryption provides the security necessary to sustain the increasingly popular VPN technology. VPNs are private connections, or tunnels, over public networks such as the Internet. They are deployed to connect telecommuters, mobile workers, branch offices, and business partners to corporate networks or each other. All VPN hardware and software devices support advanced encryption technology to provide the utmost protection for the data that they transport.
 

 

 
© Copyright 2002 Eitech. All rights reserved.