Work remotely at the highest security level

Governmental work and field operations

Developed in a high security environment with Quantum-proof encryption.

Encryption occurs in a separate, tamper-proof Hardware Security Trust Anchor – making it impossible to attack your information from outside networks.

Travel safely
with an empty device

Establish a secure remote connection back to the HQ for data access or to use your organisation’s applications up to the secret classification level.

Securely upload and download field mission data to the HQ network with the IQN-4300.

Disable lost devices Immediately and remotely

All IQN-4300 devices are provisioned and managed centrally by the IP VPN Security Management System and can be disabled immediately.

Security data is being logged with state-of-the-art interoperability to existing network security monitoring systems.

SECURE REMOTE ACCESS

The portable Asperiq IQN-4300 Personal Security Device (PSD) provides secure access for trusted users to the network services. It offers secure remote IP VPN access, personal high security storage, and advanced multi-factor authentication. Our Hardware Security Trust Anchor inside the IQN-4300 enforces the Security levels, and manages the encryption.

IP-VPN Encryption Platform

The Asperiq IP VPN Platform, with the Asperiq Hardware Security Trust Anchor inside, facilitates secure IP VPN connectivity up to SECRET / TOP SECRET classification. In addition, the Platform offers powerful encryption up to 1 Gbps/ 300 Mbps speeds for high-volume data transport and maximum availability. The Hardware Security Trust Anchor supports maximum transmission and data processing performance in real-time.

This also applies to network solutions where different session keys are used for every possible connection. The Platform units are highly secure with hardware-based encryption and tamper-proof housing. Our network encryption technology is developed in-house in a top security environment and is agnostic of how data is transmitted and the underlying transmission networks. We develop according to the highest security standards – in line with industry best practices - with the customer in control of the end security solution.

The Asperiq IP VPN Encryption Platform provides the optimal balance between usability, security, and affordability across strategic networks. It offers scalability and independence across the full range of products. New product variants within the platform can rapidly be deployed in line with your use cases. IP-VPN Platform units are connected, controlled, and optimised in an integrated secure system. In addition, we work in partnership with the customer to ensure interoperability and efficiencies with the existing infrastructure and legacy security systems.

Secure portable access to network services for trusted users is enabled via the Asperiq Personal Security Device (PSD). The PSD has been developed for mobile staff with high-security needs. It has been designed for usage together with a notebook providing remote access to headquarters, and it has secure storage for offline data processing.

ENCRYPTION FOR STRATEGIC NETWORKS

Top secure IP VPN encryption networks for information and communication exchange of classified information pertaining to National security and interests. The encryption is based on proprietary customer-specific, secret algorithms, with verifiable and controllable algorithm design.

IQM-4700

Security Management

IQN-4700

IP VPN

IQN-4500

IP VPN

ENCRYPTION FOR OPERATIONAL NETWORKS

Cutting-edge IP VPN encryption technology for secure networks tailored to government organisations, intra-government communication, and critical infrastructure companies. This solution operates with hardware-based encryption, robust symmetric keys and AES-256 algorithm to ensure seamless integration and optimal performance.

IQM-4700-A

Security Management

IQN-4700-A

IP VPN

IQN-4500-A

IP VPN

SECURE DEFENCE SOLUTIONS

Asperiq’s quantum-secure encryption technology is trusted by the defense and government sector around the world, with services and products to keep people safe – on land, at sea, and in the air.

ASPERIQ C3

An encrypted Command, Control, and Communications System designed to support military and civilian organizations to obtain situational awareness. With its plug and play design, it can easily be upgraded to increase interoperability with both legacy and modern systems.

Can be installed in a wide range of environments, and integrates into different sensors, such as radar, sonar and AIS. Together with Tactical Data Link communication, Asperiq C3 gives you an integrated situation awareness picture that can be sent to units inside or outside your organization.

IQS series

A flexible message handling solution that handles both Tactical Data Link and Text with media attachments. The encrypted messages can be transported through multiple channels such as satellite, radio and fixed lines.

Works in multiple environments and easily scales to serve a large or small team of operators. Integrate it into your existing stovepipe systems, with various cryptos and existing radios – the IQS series functionality is designed with interoperability and interconnectivity in mind.

Scalable Security Concept

Scalable security is the ability to adapt and grow solutions, the protection and controls, to meet the need of the customer and the continuously changing threat environment.

The Asperiq Hardware Security Trust Anchor is the foundation of our scalable security concept and consists of our in-house developed security hardware technology, security management and security application system. This architecture allows us to logically and technically separate the application system from the security system and apply security either localised or centralised.

Whether the need is to access and share sensitive information within the fixed network infrastructure, through hardware secured portable devices or through business applications, this can all be catered for.

The technical components of security, and the people and process aspects need to come together to achieve state of the art security. It has to be properly addressed in the preparation phase, through analysis, policies and governance, as well as in the operations phase through network monitoring and identity access management. Asperiq adds an extra security layer on top of that and we are one of very few companies that allows organisations to select, control and verify the encryption technology and its implementation.

Quantum secure
encryption technology

There is a global concern about the future threat of quantum computers against cryptographic technology. Several current cryptographic techniques would not remain secure with the development of powerful quantum computers.

However, Asperiq cryptographic technologies are quantum-safe, meaning they will withstand future quantum computer threats. There's nothing like being prepared! We make sure that your data is protected today against the possible quantum threats of the future.

Security principles

There are six principles we adhere to when implementing our technology.

SECURITY-BY-DESIGN
We apply security from the ground up from the genesis of design, engineering to deployment of hardware and software systems. As a security technology company, that is our expertise.
SECURITY BY NETWORK SEGMENTATION
Designating zones allows the organisations to consistently track the location of sensitive data and assess the relevance of an access request based on the nature of that data.
SECURITY BY VERIFICATION
We build all our solutions with the approach of Zero Trust; "always verify, never trust". As an example, our customers can control and verify the encryption technology and its implementation.
SECURITY IN DEPLOYMENT
The highest security levels are ensured when deploying an Asperiq Reference Architecture to customer security solutions.


SECURITY BY DEFAULT
Our security solutions use the most secure settings possible as a default. Then to support the security governance and the required functionality, our security solutions can be further enhanced.
SECURITY IN OPERATIONS
Secure infrastructure for calls, video, e-mail and file transfer between our customers and our experts provides full integrity for the continued business dialogues, support, and consultations.