remove

Transmission Security (TRANSEC) Technology Brief

For today’s military, situational awareness is a critical component to the success of their mission. Wherever this may be, threat actors readily stand by to monitor, exploit or intercept communications for malicious intent. To mitigate this threat, ST Engineering iDirect has provided enhanced Transmission Security (TRANSEC) capabilities with the release of the Evolution 4.2 software, extending protection to cover both one-way and two-way TRANSEC networks.

    Get information about the product

    Please do not hesitate to contact us.






    For today’s military, situational awareness is a critical component to the success of their mission. Wherever this may be, threat actors readily stand by to monitor, exploit or intercept communications for malicious intent. To mitigate this threat, ST Engineering iDirect has provided enhanced Transmission Security (TRANSEC) capabilities with the release of the Evolution 4.2 software, extending protection to cover both one-way and two-way TRANSEC networks.

    ST Engineering iDirect has implemented a TRANSEC-compliant network architecture that exceeds the requirements outlined by the U.S. government while still maintaining the quality of service needed to support voice, video and data over a satellite link. The ST Engineering iDirect platform secures VSAT transmissions from interception and exploitation by incorporating encryption inherent in COMSEC; conforming to 256-bit AES as specified by the Federal Information Processing Center (FIPS) 140-2, while masking traffic types, volumes and acquisition of remote terminals. Through a combination of hardware and software, TRANSEC ensures data blocks are a uniform size. This conceals traffic activity while incorporating a Certificate Authority (CA) issued x.509 digital certificate to authenticate the remote terminal.  Adversaries monitoring a TRANSEC-enabled network will only see an obfuscation of secure data, precluding anyone from monitoring the network, or extracting any usable information joining a protected network. As an added measure, security keys are periodically rotated to continually maintain a strong security posture. Through these security measures, the use of TRANSEC adds an authentication mechanism that prevents adversaries from joining a protected network or launching “man-in-the-middle” attacks. Conversely, adversaries would not be able to redirect a TRANSEC-enabled remote to joining another network without the proper identification and authentification.

     

    Become a Partner