Meer weten over veilige IT/OT-integratie in kritieke infrastructuur? Meld je nu aan voor de Round Table op 17 april 2025

SkyTale Generation 3

Connection security is essential to protect classified information. Public organizations are prone to espionage, manipulation of data, and other cyber crimes. By ensuring a safe exchange of information, we can protect the Netherlands against current and future threats.

The safe exchange of information requires a high-quality cryptographic solution, made in the Netherlands. Our SkyTale Generation 3 Solution ensures the secure communication of classified information over untrusted networks.

Secure communication

Protect your organization against advanced threats

Why choose SkyTale?

How it works

The SkyTale product family consists of a range of IP network encryptors for the secure communication of classified information over untrusted networks with an actively maintained roadmap.

Each solution deployment consists of multiple systems:

One Key Management System (KMS)

The station that generates the keys used to encrypt the sensitive data.

One Cryptographic Management System (CMS)

Consisting of one or more CMS nodes The nodes automatically distribute the key material from the KMS and load the configuration and key material into the ECU. The CMS is also used to diagnose and resolve problems.

Two or more End Cryptographic Units (ECUs)

A 19-inch 1U rack server providing encryption and decryption of the sensitive data.

The SkyTale solution allows interconnecting multiple distinct customer networks through untrusted external networks. The confidentiality and integrity of sensitive data on the customer networks will be protected.

Key features

1. 100% secure solution

To be approved for TOP SECRET, in close cooperation with NLNCSA and evaluated against NEC 2020 (pending)

2. User friendly and post-quantum secure

Encryption performance up to 1GBit/s

3. Trusted supply chain

Designed and assembled in the Netherlands, ensuring a trusted supply chain

4. Full control

Key generation and management under full control within own organization

5. Unique solution

The solution allows interconnecting customer networks through untrusted external networks, without losing confidentiality and integrity

Segments

Defence

Allow military units in the field to share sensitive tactical information such as locations, photos, and messages in a secure manner.

Ensure civil servants who work in different locations abroad to set up secure connections to work on confidential documents and share status updates with colleagues in other locations.

Governance

Allow military units in the field to share sensitive tactical information such as locations, photos, and messages in a secure manner.

Ensure civil servants who work in different locations abroad to set up secure connections to work on confidential documents and share status updates with colleagues in other locations.

Getting started

Step 1: Getting to know the solution

We explain everything you want to know about our secure mobile solution.

Step 2: Assessment of needs

We assess your needs and requirements to come up with a high-level solution design that works for you.

Step 3: Proof of Concept

We define, propose and support a PoC for you to test and use the solution in real life, in order to make sure your definition of success is met.

Step 4: Proposal

With all the information gathered above, we will be able to provide you with a tailored proposal for a fully operational solution at scale, including all required deployment and support services.

Step 5: Implementation & customization

We help you implement the solution and customize it to fit your needs.

Step 6: Service & support

We are with you every step of the way, providing you the service you need.

Introducing the rSync Replicator: A game-changer for secure file synchronization cover

Keep your data secure and your people safe

Over twenty years of experience

As a pioneer in high-assurance security solutions, Fox Crypto brings more than twenty years experience in protecting classified information and data.