How to protect sensitive information on smartphones? Register for the webinar on May 22!

SkyTale Generation 3

Connection security is essential to protect classified information. Public organizations are prone to espionage, manipulation of data, and other cyber crimes. By ensuring a safe exchange of information, we can protect the Netherlands against current and future threats.

The safe exchange of information requires a high-quality cryptographic solution, made in the Netherlands. Our SkyTale Generation 3 Solution ensures the secure communication of classified information over untrusted networks.

Secure communication

Protect your organization against advanced threats

Why choose SkyTale?

How it works

The SkyTale product family consists of a range of IP network encryptors for the secure communication of classified information over untrusted networks with an actively maintained roadmap.

Each solution deployment consists of multiple systems:

One Key Management System (KMS)

The station that generates the keys used to encrypt the sensitive data.

One Cryptographic Management System (CMS)

Consisting of one or more CMS nodes The nodes automatically distribute the key material from the KMS and load the configuration and key material into the ECU. The CMS is also used to diagnose and resolve problems.

Two or more End Cryptographic Units (ECUs)

A 19-inch 1U rack server providing encryption and decryption of the sensitive data.

The SkyTale solution allows interconnecting multiple distinct customer networks through untrusted external networks. The confidentiality and integrity of sensitive data on the customer networks will be protected.

Key features

1. 100% secure solution

To be approved for TOP SECRET, in close cooperation with NLNCSA and evaluated against NEC 2020 (pending)

2. User friendly and post-quantum secure

Encryption performance up to 1GBit/s

3. Trusted supply chain

Designed and assembled in the Netherlands, ensuring a trusted supply chain

4. Full control

Key generation and management under full control within own organization

5. Unique solution

The solution allows interconnecting customer networks through untrusted external networks, without losing confidentiality and integrity

Segments

Defence

In the defence sector, safeguarding classified information is critical to national security. Military organizations are constantly exposed to cyber threats, including espionage, data manipulation, and cyber warfare. Ensuring the secure exchange of sensitive information is essential to protecting military operations from both current and emerging threats.

Ensuring the secure exchange of sensitive information is essential to protecting militairy operations from both current and emerging threats.

Government

Government institutions handle vast amounts of sensitive and classified information daily, from policy decisions to citizen data. The security of this information is crucial to maintaining national stability and public trust. 

However, these organizations are frequent targets of cyber threats, including espionage, data breaches, and digital manipulation.

Getting started

Step 1: Getting to know the solution

We explain everything you want to know about our secure mobile solution.

Step 2: Assessment of needs

We assess your needs and requirements to come up with a high-level solution design that works for you.

Step 3: Proof of Concept

We define, propose and support a PoC for you to test and use the solution in real life, in order to make sure your definition of success is met.

Step 4: Proposal

With all the information gathered above, we will be able to provide you with a tailored proposal for a fully operational solution at scale, including all required deployment and support services.

Step 5: Implementation & customization

We help you implement the solution and customize it to fit your needs.

Step 6: Service & support

We are with you every step of the way, providing you the service you need.

Introducing the rSync Replicator: A game-changer for secure file synchronization cover

Keep your data secure and your people safe

Over twenty years of experience

As a pioneer in high-assurance security solutions, Fox Crypto brings more than twenty years experience in protecting classified information and data.