FTL Systems' Secure Network Systems
Complete Secure Network Systems Integrated with other FTL Systems Suites
FTL Systems' TeraStream™ secure networking systems link "edge devices"
and back-room integrated data centres. They enhance customer operations with higher
bandwidth, greater security and improved quality of service. A seemless integration
with FTL Systems industry suites (hardware and software) facilitates initial system
bring-up and life-cycle maintenance. Other than FTL wired clients, FTL works with
popular third-party smart devices and industry-standard interfaces.
Heavy reliance on industry standards and FTL-specific enhancements to industry standards
facilitates rapid customer integration and upgrades. Primary wireless interfaces are
4G LTE, upcoming 5G and WiFi. Primary "wired" interfaces include 1G copper, SFP/SFP+
(1G and 10G SR/LR optical and CX4), CFP (100G) and FTL's unique TeraBit linkages. The
switch chassis are FTL-enhanced versions of the industry-standard Advanced
Telecommunications Architecture (ATCA), both micro and full size. Auxilliary disk
array systems provide for traffic buffering and streaming content (such as movies on
demand and cloud storage).
Voice communication leverages industry-standard "voice over internet packet" (VOIP)
technology using third party phones or phones including strong encryption built
into the handset to realize strong end-to-end user security.
Legitimate corporation are our customers. Back-doors, weak-encryption or
other security compromises are far more likely to facilitate crime than to really make
honest people safe. Thus FTL Systems builds strong security and do what we say.
If you do not value your corporation's assets or security there are an adequate
number of insecure systems available. Under "know-your-customer" protocols, FTL
Systems carefully vets customers and only sells secure networking to corporations
which pass vetting. If you operate somewhere public servants ignorantly try to
obstruct strong corporate network security, please fix the servants!
Segmented Networks and Multi-Level Gateways
FTL Systems' TeraStream ™ secure network architecture assumes partitioning
of a corporate network into distinct security compartments based on the kind of
information contained, transmitted and processed. Multi-level security gateways
provide informed packet filtering and potentially tunneling between distinct
physical locations via "virtual private networks" (VPN).
Switches (conventional or TeraStream) route internet packets over optical, copper
or wireless pathways. Switches may further partition compartments based on IP
addresses, ports, subnets or other attributes. Connections range from 1,000G
bits per second down to less than 1M bit per second depending on the route and
Email, Web and File Transfer Servers
Today's world depends on point-to-point transfer of files. Email servers,
Web servers and File Transfer Protocol (FTP) servers act as the respositories
and hubs for files. While backward compatibility with associated client /
server protocols is practically required, FTL Systems focuses on strong,
secure encapsulation of file information while it is in transit. Security
is usually limited by the security associated with third party clients such
as third hand-held devices and the Internet of Things (IoT) such as smart
appliances and industrial controls.
Domain Name Servers
Domain Name Servers (DNS) translate human-readable network names, such as
www.ftlsystems.com into machine-readable addresses (IPV4 or IPV6). They also
provide reverse translation from machine addresses to human-readable addresses.
As a co-lateral service, DNS can also provide validation and dynamic assignment
of machine-readable addresses (DHCP) as well as network security credentials.
Network security is only as good as the security of clients authenticated to
networks. Out-of-band attacks such as conceptually taking a digital photo of
a secure screen using an insecure device, key-loggers or other attacks can
render the most secure network insecure. While FTL Systems does not built
hand-held clients we work with third parties to maximize hand-held security
to the maximum extend feasible.
Physical security must go along with network security. FTL Systems is not in
the business of providing others with physical security against espionage.
We can suggest third parties who can provide shielding against both emissions
and attack via radiated electro-magnetic spectrum. These third parties build
Secure Compartmentalized Information Facilities (SCIF) for Corporations. Our
strategic approach depends on end-to-end encryption when communicating between
facilities rather than assuming wide-area-network links can be secured.