The genucrypt VPN Appliance provides you with face-to-face confidentiality when communicating across public networks.
Our solution establishes encrypted connections – virtual private networks (VPNs) – that securely bypass public networks. Data can thereby be conveniently and reliably protected while it is exchanged over the Internet, for example, between a company’s various locations. As a cloud provider, you can use the genucrypt VPN Appliance to securely connect your customers to your services.
Easily Set Up Complex Networks
You can also connect individual clients – genucrypt sets no limits here. The appliance allows you to set up as many VPN connections as you need to securely link complex networks.
With genucrypt, you can connect any number of local networks using a VPN – without the need to establish a complex maze of VPN tunnels. The numerous individual connections between the networks are distributed over a greatly reduced number of VPN tunnels through the cleverly used IPsec functions. Thus, multiple individual connections that are strictly separated from one another pass through each tunnel. This minimizes expense associated with configuration, maintenance, and computer capacities, while at the same time eliminating a large number of error sources.
Even large VPN networks can be easily managed, as the connections of all participants are controlled by a central management server. This means that you can install and operate a powerful VPN for secure data exchange between your distributed networks with very little effort as well as flexibly expand it as requirements change.
genucrypt meets the highest security requirements. Your data is encrypted absolutely securely using strong algorithms. On request, keys can be created using a Public Key Infrastructure (PKI) with a central server. genucrypt can also already function with IPv6. Our customers can thus be certain that they are purchasing a high-quality and future-proof solution.
The appliance is administrated via its own web GUI or, if you use several devices, conveniently using the user-friendly genucenter Management Station. To meet the various requirements, we offer genucrypt in a number of different hardware variants, ranging from a maintenance-free, compact appliance up to rack server solutions for high data throughput.
Post-Quantum Cryptography: genua Meets Future Security Requirements
With products from genua you can make the transition to post-quantum cryptography. Our update mechanism guarantees trustworthy product updates today and in the future: In addition to a digital signature for maximum security according to current standards, the addition of a quantum-resistant signature already provides effective protection against attacks with quantum computers.
A Safe Investment in Accordance with the BSI Recommendation
Experts assume that in a few years, quantum computers could weaken or even break the current cryptographic methods. The security of the XMSS method developed by genua in cooperation with the Technical University of Darmstadt and the Technical University of Eindhoven is well understood today. By applying this method, we meet the recommendations for future-proof software updates according to the German Federal Office for Information Security (BSI) and the National Institute of Standards and Technology (NIST).
As a collaborative learning company, it is our mission to continuously improve and share our knowledge of IT Security with you. In our Knowledge Base we offer you articles, white papers, analyst reports, research results, videos and more in the field of IT security.