Unchecking this box will prevent you from subscribing to Ciena's communications.
I agree to subscribe to Ciena's communications.
I understand I can unsubscribe at any time.
I agree to subscribe to Ciena's communications. I understand I can unsubscribe at any time.
What do you get when you combine market-leading coherent optics with proven encryption technology on Ciena’s flagship 6500 Packet-Optical Platform? The industry’s first coherent 100G/200G optical encryption solution.
WaveLogic Encryption is a simple-to-implement in-flight data protection solution with advanced security capabilities. This solution leverages the unmatched performance and programmability of Ciena’s WaveLogic 3 Extreme chipset to efficiently meet all of your infrastructure needs. WaveLogic Encryption extends to Ciena’s Waveserver enabling 400G of wire-speed encryption capacity in 1RU for simple, secure, rack-and-stack web-scale DCI applications.
Now it’s easy to evolve from cumbersome to commonplace encryption deployments. Ciena’s WaveLogic Encryption delivers an ultra-low latency, protocol-agnostic, wire-speed optical encryption solution to match today’s high-capacity infrastructure needs—from 10G to 100G, 200G, and beyond.
Deploy Ciena’s simple-to-implement WaveLogic Encryption for:
In today’s web-scale communications, your in-flight data is secure as long as you can keep the hackers out. How robust is your optical encryption?
Ciena’s WaveLogic Encryption solution is purpose-built with the highest level of in-flight data security in mind to protect all of your information and lockout the bad actors:
WaveLogic Encryption is a complete solution that includes MyCryptoTool, a simple-to-use, dedicated encryption management end-user portal designed for distributed management of the network. This approach enables secure management of Encryption-as-a-Service capability by the end-user in carrier-managed or enterprise-managed networks.
MyCryptoTool ensures that only the owner of the data—the end-user—maintains full control of the encryption security parameters associated with their critical data. It’s easier than ever to issue new keys or certificates as required by your security policies—and you can monitor your encrypted services on an end-to-end basis with security-specific alarms and logs.