{"id":370,"date":"2020-05-19T17:30:05","date_gmt":"2020-05-19T17:30:05","guid":{"rendered":"https:\/\/www.cylentium.com\/?page_id=370"},"modified":"2020-10-06T16:37:27","modified_gmt":"2020-10-06T16:37:27","slug":"technical","status":"publish","type":"page","link":"https:\/\/www.cylentium.com\/technical","title":{"rendered":"TECHNICAL"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

<\/p>\n

\u2022 FIPS & EAL4 certified Cryptography
\u2022 Encrypting network traffic at Layer 2 using FIPS 140-2 approved algorithms in a software-only solution.
\u2022 Encryption of packets at layer 2 pro-tects more network protocols and makes the topology and details of the network un-snoop able.
\u2022 Fully Functional LAN emulation – Cryptographically secure remote computing
\u2022 Extends hardened enterprise \u201cEdge\u201d perimeter to include remote users, mobile, wireless, and wired
\u2022 Dynamic expansion capability that is unlimited in territory coverage
\u2022 Supports 802.1x, 802.1ae, and other advanced security standards and algo-rithms
\u2022 Support all Layers 3 and above
\u2022 Support advanced routable Tunneling
\u2022 Advanced VPN Protocol is 7 times fast-er than current industry performance
\u2022 Advanced Endpoint Protection
\u2022 Certified Cisco, Juniper, Aruba, Extreme, Checkpoint
\u2022 Certified Army & Navy Research Labs
\u2022 Certified Defense Information Systems Agency (DISA); Department of Defense (DoD); Department of Energy (DOE); Department of Defense(DnD); Department of\u00a0National Defense Canada (DND)<\/p>\n

<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

\u2022 FIPS & EAL4 certified Cryptography\u2022 Encrypting network traffic at Layer 2 using FIPS 140-2 approved algorithms in a software-only solution.\u2022 Encryption of packets at layer 2 pro-tects more network protocols and makes the topology and details of the network un-snoop able.\u2022 Fully Functional LAN emulation – Cryptographically secure remote computing\u2022 Extends hardened enterprise \u201cEdge\u201d …<\/p>\n

TECHNICAL<\/span> Read More »<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"yoast_head":"\nTECHNICAL - Cylentium.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cylentium.com\/technical\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TECHNICAL - Cylentium.com\" \/>\n<meta property=\"og:description\" content=\"\u2022 FIPS & EAL4 certified Cryptography\u2022 Encrypting network traffic at Layer 2 using FIPS 140-2 approved algorithms in a software-only solution.\u2022 Encryption of packets at layer 2 pro-tects more network protocols and makes the topology and details of the network un-snoop able.\u2022 Fully Functional LAN emulation – Cryptographically secure remote computing\u2022 Extends hardened enterprise \u201cEdge\u201d … TECHNICAL Read More »\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cylentium.com\/technical\" \/>\n<meta property=\"og:site_name\" content=\"Cylentium.com\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-06T16:37:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cylentium.com\/technical\",\"url\":\"https:\/\/www.cylentium.com\/technical\",\"name\":\"TECHNICAL - Cylentium.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.cylentium.com\/#website\"},\"datePublished\":\"2020-05-19T17:30:05+00:00\",\"dateModified\":\"2020-10-06T16:37:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cylentium.com\/technical#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cylentium.com\/technical\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cylentium.com\/technical#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cylentium.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TECHNICAL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cylentium.com\/#website\",\"url\":\"https:\/\/www.cylentium.com\/\",\"name\":\"Cylentium.com\",\"description\":\"Cylentium | The Leading Provider of Security Software for Wireless, Ethernet, And Cyber Security Networks.\",\"publisher\":{\"@id\":\"https:\/\/www.cylentium.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cylentium.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cylentium.com\/#organization\",\"name\":\"Cylentium.com\",\"url\":\"https:\/\/www.cylentium.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cylentium.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cylentium.com\/wp-content\/uploads\/2022\/07\/cropped-cylentium-10_Color-Letters-8-1.png\",\"contentUrl\":\"https:\/\/www.cylentium.com\/wp-content\/uploads\/2022\/07\/cropped-cylentium-10_Color-Letters-8-1.png\",\"width\":1280,\"height\":375,\"caption\":\"Cylentium.com\"},\"image\":{\"@id\":\"https:\/\/www.cylentium.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TECHNICAL - Cylentium.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cylentium.com\/technical","og_locale":"en_US","og_type":"article","og_title":"TECHNICAL - Cylentium.com","og_description":"\u2022 FIPS & EAL4 certified Cryptography\u2022 Encrypting network traffic at Layer 2 using FIPS 140-2 approved algorithms in a software-only solution.\u2022 Encryption of packets at layer 2 pro-tects more network protocols and makes the topology and details of the network un-snoop able.\u2022 Fully Functional LAN emulation – Cryptographically secure remote computing\u2022 Extends hardened enterprise \u201cEdge\u201d … TECHNICAL Read More »","og_url":"https:\/\/www.cylentium.com\/technical","og_site_name":"Cylentium.com","article_modified_time":"2020-10-06T16:37:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cylentium.com\/technical","url":"https:\/\/www.cylentium.com\/technical","name":"TECHNICAL - Cylentium.com","isPartOf":{"@id":"https:\/\/www.cylentium.com\/#website"},"datePublished":"2020-05-19T17:30:05+00:00","dateModified":"2020-10-06T16:37:27+00:00","breadcrumb":{"@id":"https:\/\/www.cylentium.com\/technical#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cylentium.com\/technical"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cylentium.com\/technical#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cylentium.com\/"},{"@type":"ListItem","position":2,"name":"TECHNICAL"}]},{"@type":"WebSite","@id":"https:\/\/www.cylentium.com\/#website","url":"https:\/\/www.cylentium.com\/","name":"Cylentium.com","description":"Cylentium | The Leading Provider of Security Software for Wireless, Ethernet, And Cyber Security Networks.","publisher":{"@id":"https:\/\/www.cylentium.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cylentium.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cylentium.com\/#organization","name":"Cylentium.com","url":"https:\/\/www.cylentium.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cylentium.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cylentium.com\/wp-content\/uploads\/2022\/07\/cropped-cylentium-10_Color-Letters-8-1.png","contentUrl":"https:\/\/www.cylentium.com\/wp-content\/uploads\/2022\/07\/cropped-cylentium-10_Color-Letters-8-1.png","width":1280,"height":375,"caption":"Cylentium.com"},"image":{"@id":"https:\/\/www.cylentium.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/pages\/370"}],"collection":[{"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/comments?post=370"}],"version-history":[{"count":0,"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/pages\/370\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cylentium.com\/wp-json\/wp\/v2\/media?parent=370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}