X7

Data security by encryption
X7 Title Graphics (Cover picture)

The challenge

Military systems and their data are increasingly at risk from hostile forces seeking to exploit the data to their advantage. Data breaches are an ever-present threat, putting classified and sensitive data at risk.

The threat is particularly significant on autonomous platforms (UAV, UGV, UUV) that can be easily captured.

In the field, data must be protected by encryption. This guarantees the confidentiality, integrity and authenticity of the data, whether it is transmitted or stored by the platform.

The encryption system must be high-performance (fast, low latency, etc.) and capable of protecting itself against the latest generation of physical, electromagnetic and digital cyber-attacks.

Domains
X7

Our solution

The HENSOLDT X7 is a rugged, embeddable data security module with a low Size, Weight and Power (SWaP) that allows you to protect your top secret and lower level data at rest and data in transit at the Internet Protocol (IP) level.

The HENSOLDT X7 provides cryptography features for military applications such as unmanned platforms, tactical communications and sensor networks.

It combines state-of-the-art technology with the strictest security standards, to provide the highest level of protection for your most sensitive data.

The HENSOLDT X7 solution can adapted to the host equipment or platform it’s integrated into, while maintaining its high level of security.

Easy to transport and install, our products are designed to integrate seamlessly with each other.

X7 Title Graphics (Cover picture)

Features and benefits

Features

  • Hardware encryption
  • Operates with public (AES), NATO or national algorithms.
  • Security certification up to CC EAL4+ or NATO Secret
  • TAMPER protection / anti-intrusion
  • Automated key management
  • ZEROISE (deletion of keys)
  • High performances (high throughput and low latency)
  • Low SWaP
  • Point to point encryption
  • Virtual Private Network (VPN)
  • Interoperability
  • ITAR-free
  • Eligible for offset requirements via transfer of knowledge and production
  • Scalable to Post-Quantum Cryptography (PQC)

Benefits

  • Secures data exchanged over a VPN
  • Secures data stored on the platform
  • Enhances national sovereignty in cryptography and cybersecurity
  • Customisable functions and mechanical housing to meet specific use scenarios
  • Helps address current and future cyber threats
  • Enhanced security thanks to stand-alone hardware module (not corrupted if the host is attacked)
  • Simplifies operator tasks and reduces the risk of key confusion
  • Modular solution for a wide range of equipment, systems and platforms
  • Combat proven
  • ITAR-free

Download area