温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/products/nqx/references
点击访问原文链接

SSH NQX solutions for encrypted data traffic and government site access

SSH NQX solutions for encrypted data traffic and government site access About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers NQX™ Benefits Use cases Tech specs Buy NQX NQX™ Quantum-safe encryption Why do customers choose NQX? 

SSH has more than 25-year-long history at the forefront of encryption. We have leveraged that expertise in the technologies embedded in NQX.

Who is NQX for? NQX is ideal for governmental organizations and enterprises who need to ensure their data-in-transit meets official certification standards or otherwise need a very high level of security. NQX provides quantum-safe encryption certified to the TL III (Classified) level as per Finnish NCSA requirements.

Government site access for remote branches and workers Decentralized government operations with branch offices, embassies and sites inside and outside the country require uncompromising and protocol- independent security for data transport for protection against integrity and confidentiality breaches. 

Businesses regulated by GDPR Organizations and companies transferring, for example, healthcare and social security-related information between sites must be secure and comply with GDPR regulations.

Businesses in operational technology (OT) In operational environments, it is crucial that access is highly secure, as well as highly available. NQX ensures connections are secure and services available even during attack attempts from the public Internet.

Network operators running data centers Network operations have regulations and requirements related to cybersecurity set by NCSA.

NQX certified at the TL III security level The National Cyber Security Authority (NCSA) at the Finnish Communications Regulatory Authority (Traficom) has certified the SSH NQX™ IP encryptor appliance as a cryptographic product for protecting classified information according to Finnish national (FI) TL III security requirements.

We are extremely pleased that Finnish solutions are granted the certification to secure highly-classified information on a national level and that these solutions are further developed into exportable innovations."

Kirsi Karlamaa, director general, Finnish Transport and Communications Agency

The collaboration between SSH and the State Security Networks Group (on NQX) ensures that the ownership of a strategically vital piece of cybersecurity is developed in Finland and that we at SSH can grow our business with the solution."

Teemu Tunkelo, CEO at SSH

NQX is part of an award-winning team SSH is proud to be a part of the Post-Quantum Cryptography Finland initiative that won the Finnish Security Award 2020 in the "Future" category. Read more about the Finnish Security Awards

SSH is also one of the key players in the Post-Quantum development project. Read more about the PQC Finland project

NQX use cases Encrypt WAN (Wide Area Network) transport against data breaches By default, WAN connections that run on xWDM (wavelength-division multiplexing), MPLS (Multiprotocol Label Switching) or IP are not encrypted. WAN sessions that transport classified information need to be secure and traditional solutions are costly and require specialized hardware.

NQX solves this problem for governments and businesses with a cost-effective software-based solution and a scalable range of certified hardware.

High-performance encrypted site-to-site VPNs for government site access For MPLS-VPN or similar technology replacement and enrichment, NQX VPNs can be built flexibly and scalably either as L2 or L3.

NQX offers Ethernet encryption over IP, with support for VLAN, QinQ and Trunking. NQX is designed for high-speed branch office connectivity and provides future-ready IPsec VPNs over IPv4 and IPv6.

Rule-based routing SSH (Secure Shell) and DNS (Domain Name Service) connections need to be steered on trusted servers to avoid human error or shortcuts that bypass security controls and violate policies.

With NQX rule-based forwarding, every data packet can be forced to use the selected output-interface and next-hop address, overruling normal routing. This ensures secure data forwarding that meets your strict security policies and regulatory mandates.

DDoS-tolerant edge gateway for high-speed uplinks Sophisticated, longer-duration DDoS  attacks are all too common in the digital world.

Even under a heavy load of fake connections, NQX keeps genuine connections operable and responsive with very low latency. Your critical encrypted sessions stay alive.

Secure and transparent interconnection for data centers With L2 encryption of Ethernet frames, data centers can be inter-connected without changes to network topology or parameters.

NQX supports Ethernet features, including VLANs, QinQ and trunking.

Transport classified data on any network, including the Internet Use of the Internet as transport is typically very cost effective, available almost everywhere and fast to deploy.

By using NQX to apply certified encrypted tunneling, the Internet can be used as a secure transport medium for highly classified data.

Learn more about NQX technologies

SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录