In the new age of technology easier communications tag along with IT infrastructure

Internet, as a public and widespread network, is rapidly progressing in the world. This is where its technical properties and non-private nature of Internet reduce the chance of using it as a secure network for some activities, including commercial and sensitive data interchange.
NED-2121, as a security gateway, provides services in order...

Most of the organizations have a server farm in their network center. Client/Server applications on hosts connect to these servers over LAN/WAN and provide various services to the users. Security is one of the important challenging problems of these organizations. Lack of suitable security tools may result in huge amounts of detriment.

Information security is the protection of information to ensure: 

  • Confidentiality.
  • Integrity 
  • Availability

Information Security Management System (ISMS) is way to protect and manage information based on a systematicbusiness risk approach, to establish, implement, operate, monitor, review, maintain, and...

Mobile phone, as a new communication tool, plays an essential role in the human life and its penetration is getting ahead of the ordinary telephone in some parts of the world.
Most of the countries use GSM standard for mobile phone systems. In order to protect conversations, GSM standard encrypts digital data transmitted across the air...

iei delivers  various filtering solutions with different levels of performance and various grades of sophistication depending on the customer's needs.These filters might be standalone or an array of fault tolerant devices with or without load balancing. The standalone filter is a customized and tuned up UNIX ® box with filter software installed...

General Description:
The Ned-4182 ciphering system guarantees secure data transmission in G.703 and G.704 standards.
This system supports the ATM, PCM and Frame Relay protocols. The NED-4182 cipher/decipher data in transmitting or receiving with rate of 2Mbits/s.
In the special model wich could be installed in...

Electronic mail (Email) is one of the most popular Internet services. People using thisservice is able to send Emails to everywhere in the world with a low cost. Emails in the way from source to destination and also when they are stored on the server can be seen, deleted or even forged. To prevent these threats in the Email service the Public...

Physical specification;

  • Four 10/100/1000 Ethernet ports
  • Serial port console with full setup capabilities
  • 19 inch tack mountable chassis with 1u height
  • PANTONE 295u color,1×power LED (may change)
  • Dimensions : 426×379×43.5mm (W×D×H)
  • Power 100
  • ...

Cryptophone Software, DES-1152 Nowadays, telephone is the most popular communication media in the world.
However, since voice signals pass through the public switched telephone network, phone conversation and data transfer via telephone lines are strongly vulnerable to various threats such as eavesdropping and fabricating by illegal...

Username and password are commonly used to control user access when logging into the computer systems and networks. In this method, usually using a specific protocol, the user is authenticated and the access is granted. This authentication method is called one factor. In this method, the hacker can access user's password by attacks such as...