IP-VPN Encryption Platform

The Asperiq IP VPN Platform, with the Asperiq Hardware Security Trust Anchor inside, facilitates secure IP VPN connectivity up to SECRET / TOP SECRET classification. In addition, the Platform offers powerful encryption up to 1 Gbps/ 300 Mbps speeds for high-volume data transport and maximum availability. The Hardware Security Trust Anchor supports maximum transmission and data processing performance in real-time.

This also applies to network solutions where different session keys are used for every possible connection. The Platform units are highly secure with hardware-based encryption and tamper-proof housing. Our network encryption technology is developed in-house in a top security environment and is agnostic of how data is transmitted and the underlying transmission networks. We develop according to the highest security standards – in line with industry best practices - with the customer in control of the end security solution.

The Asperiq IP VPN Encryption Platform provides the optimal balance between usability, security, and affordability across strategic networks. It offers scalability and independence across the full range of products. New product variants within the platform can rapidly be deployed in line with your use cases. IP-VPN Platform units are connected, controlled, and optimised in an integrated secure system. In addition, we work in partnership with the customer to ensure interoperability and efficiencies with the existing infrastructure and legacy security systems.

Secure portable access to network services for trusted users is enabled via the Asperiq Personal Security Device (PSD). The PSD has been developed for mobile staff with high-security needs. It has been designed for usage together with a notebook providing remote access to headquarters, and it has secure storage for offline data processing.

ENCRYPTION FOR STRATEGIC NETWORKS

High-assurance IP encryption solutions for the secure exchange of classified information vital to national defence and strategic interests. Encryption is built on customer-specific, secret algorithms with fully verifiable and controllable design, ensuring maximum cryptographic independence and national trust.

IQM-4700

Security Management

IQN-4700

IP VPN

IQN-4500

IP VPN

SECURE REMOTE ACCESS

The portable Asperiq IQN-4300 Personal Security Device (PSD) provides secure access for trusted users to the network services. It offers secure remote IP VPN access, personal high security storage, and advanced multi-factor authentication. Our Hardware Security Trust Anchor inside the IQN-4300 enforces the Security levels, and manages the encryption.

Work remotely at the highest security level

IQN-4300

IP VPN

Governmental work and field operations

Developed in a high security environment with Quantum-proof encryption.

Encryption occurs in a separate, tamper-proof Hardware Security Trust Anchor – making it impossible to attack your information from outside networks.

Travel safely
with an empty device

Establish a secure remote connection back to the HQ for data access or to use your organisation’s applications up to the secret classification level.

Securely upload and download field mission data to the HQ network with the IQN-4300.

Disable lost devices Immediately and remotely

All IQN-4300 devices are provisioned and managed centrally by the IP VPN Security Management System and can be disabled immediately.

Security data is being logged with state-of-the-art interoperability to existing network security monitoring systems.

SECURE INTEROPERABILITY FOR MISSION-CRITICAL COMMUNICATION

Purpose-built for deployment in both tactical and strategic domains, the IQN-4530 enables secure, seamless communication across a wide range of radio systems, IP networks, and vendors. It creates a unified high-security encryption layer using customer-specific cryptographic algorithms, allowing trusted information exchange and real-time interoperability across joint operations. The IQN-4530 ensures full control, confidentiality, and operational resilience in complex and dynamic environments.

IQN-4530

IP VPN and RadioCom

Asperiq’s quantum-secure encryption technology is trusted by the defense and government sector around the world, with products and services to keep people safe – on land, at sea, and in the air.

ASPERIQ C3

A fully encrypted Command, Control, and Communications (C3) system designed to support both military and civilian organisations in achieving comprehensive situational awareness. Its plug-and-play architecture allows for easy upgrades, enabling seamless interoperability with both legacy and modern platforms.

Asperiq C3 can be deployed in a wide range of environments and integrates with sensors such as radar, sonar, and AIS. Combined with Tactical Data Link communications, it delivers a unified situational awareness picture that can be securely shared across internal and external units.

IQS series

A flexible, encrypted message-handling solution that supports both Tactical Data Links and standard text messages with media attachments. Messages can be securely transmitted via satellite, radio, or fixed-line communications.

The IQS Series operates effectively in diverse environments and easily scales to support both small teams and large operations. Designed for interoperability, it integrates with existing stovepipe systems, various crypto solutions, and radios, ensuring secure and efficient information exchange across platforms.

Scalable Security Concept

Scalable security is the ability to adapt and grow solutions, the protection and controls, to meet the need of the customer and the continuously changing threat environment.

The Asperiq Hardware Security Trust Anchor is the foundation of our scalable security concept and consists of our in-house developed security hardware technology, security management and security application system. This architecture allows us to logically and technically separate the application system from the security system and apply security either localised or centralised.

Whether the need is to access and share sensitive information within the fixed network infrastructure, through hardware secured portable devices or through business applications, this can all be catered for.

The technical components of security, and the people and process aspects need to come together to achieve state of the art security. It has to be properly addressed in the preparation phase, through analysis, policies and governance, as well as in the operations phase through network monitoring and identity access management. Asperiq adds an extra security layer on top of that and we are one of very few companies that allows organisations to select, control and verify the encryption technology and its implementation.

Quantum secure
encryption technology

There is a global concern about the future threat of quantum computers against cryptographic technology. Several current cryptographic techniques would not remain secure with the development of powerful quantum computers.

However, Asperiq cryptographic technologies are quantum-safe, meaning they will withstand future quantum computer threats. There's nothing like being prepared! We make sure that your data is protected today against the possible quantum threats of the future.

Security principles

There are six principles we adhere to when implementing our technology.

SECURITY-BY-DESIGN
We apply security from the ground up from the genesis of design, engineering to deployment of hardware and software systems. As a security technology company, that is our expertise.
SECURITY BY NETWORK SEGMENTATION
Designating zones allows the organisations to consistently track the location of sensitive data and assess the relevance of an access request based on the nature of that data.
SECURITY BY VERIFICATION
We build all our solutions with the approach of Zero Trust; "always verify, never trust". As an example, our customers can control and verify the encryption technology and its implementation.
SECURITY IN DEPLOYMENT
The highest security levels are ensured when deploying an Asperiq Reference Architecture to customer security solutions.


SECURITY BY DEFAULT
Our security solutions use the most secure settings possible as a default. Then to support the security governance and the required functionality, our security solutions can be further enhanced.
SECURITY IN OPERATIONS
Secure infrastructure for calls, video, e-mail and file transfer between our customers and our experts provides full integrity for the continued business dialogues, support, and consultations.