Hardware-enforced Enterprise Encryption Solutions
“Bump-in-the-line” hardware-enforced encryption/decryption with ultra-low latency, low power and an easy-to-use Enterprise Network Management System
![](https://static.wixstatic.com/media/689b47_de4a53c35d154f0bace99277ecdef7a1~mv2.jpg/v1/fill/w_147,h_83,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/689b47_de4a53c35d154f0bace99277ecdef7a1~mv2.jpg)
Sitehop Solution Features
![](https://static.wixstatic.com/media/689b47_a314d3fff4c744c69dfaa3d72667a442~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_a314d3fff4c744c69dfaa3d72667a442~mv2.png)
Quantum Resistant
![](https://static.wixstatic.com/media/689b47_78ab287c557944c6b9b9b47e1380af35~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_78ab287c557944c6b9b9b47e1380af35~mv2.png)
Small Packet Size Performance
![](https://static.wixstatic.com/media/689b47_49b03ddb9c60462c94afb62e22f3fd93~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_49b03ddb9c60462c94afb62e22f3fd93~mv2.png)
High Security
![](https://static.wixstatic.com/media/689b47_7f5bf4e44fea4a1085023c679c75d113~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_7f5bf4e44fea4a1085023c679c75d113~mv2.png)
Multiple Configurations, One Device
![](https://static.wixstatic.com/media/689b47_b53cfaecf4c64e159936f0ccdd644a1a~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_b53cfaecf4c64e159936f0ccdd644a1a~mv2.png)
100Gbps
![](https://static.wixstatic.com/media/689b47_fabd0506c5664706b1615eccafef8c77~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_fabd0506c5664706b1615eccafef8c77~mv2.png)
Rest API
![](https://static.wixstatic.com/media/689b47_00e0d3a68b1f4fec8313b1c2069da94f~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_00e0d3a68b1f4fec8313b1c2069da94f~mv2.png)
1Tbps
![](https://static.wixstatic.com/media/689b47_e8a1e1ff44c54ad09339589b0f1e3162~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_e8a1e1ff44c54ad09339589b0f1e3162~mv2.png)
IPsec Compatible
![](https://static.wixstatic.com/media/689b47_4c752194fd504a468859754f64b07e0a~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_4c752194fd504a468859754f64b07e0a~mv2.png)
Secure Certificates
![](https://static.wixstatic.com/media/689b47_9fda5463fbf344568494ebb0cb13517e~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_9fda5463fbf344568494ebb0cb13517e~mv2.png)
100% Encryption Offload
![](https://static.wixstatic.com/media/689b47_ef18cab76f3041fda3390b219d3f92d2~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_ef18cab76f3041fda3390b219d3f92d2~mv2.png)
4000 Secure Connections
![](https://static.wixstatic.com/media/689b47_50c1d9dd41f24f9f90cee1b2b11e2c4d~mv2.png/v1/fill/w_73,h_73,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/689b47_50c1d9dd41f24f9f90cee1b2b11e2c4d~mv2.png)
Hardware-Enforced Security
![shutterstock_1213401454_newjpg_edited.jpg](https://static.wixstatic.com/media/689b47_0ee42ecce45e48bdaf83569946902a00~mv2.jpg/v1/fill/w_147,h_74,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/689b47_0ee42ecce45e48bdaf83569946902a00~mv2.jpg)
We Take Pride in Our Numbers
100
Gigabytes per second
4000+
Concurrent Connections
950
nanosecond Latency
40
Watts for full throughput
How it works
Step One
Specify edge locations and how many connections need to be encrypted
1
2
Step Two
Plug and Play Unpack. Power up. Connect Cables.
Subscription auto-configures
Step Three
Select certificates and specify permissions
3
4
Step Four
That’s it!
Rest easy knowing your data is safe.