Secure communications

Ensuring organisations can exchange information securely, which includes using the Internet, secure voice communications, wireless networks and VPNs.
Showing 22 results
Sort by: A-Z|Date
  • Secure communications

    TLS 1.3: better for individuals - harder for enterprises

    Blog post09 Mar 2018AuthorIan LevyTopicsCryptography, Secure communications

    The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.

  • Security Procedures Egress Switch

    Document07 Mar 2018TopicsIT infrastructure, Technology at OFFICIAL, End user technology, Secure communications

    These Security Procedures provide guidance in the secure operation of Egress Switch.

  • Securing email

    Improving email security

    Blog post15 Sep 2017AuthorRichard CTopicsOperational security, Data in transit, Secure communications
  • End User Devices: VPNs

    Guidance01 Aug 2017TopicsIT infrastructure, End user technology, Secure communications

    In this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.

  • TEMPEST and EMS Policy

    Information18 Jul 2017TopicsNetwork security, Secure communications
  • A safe

    Which smartphone is the most secure?

    Blog post10 Feb 2017AuthorAndy PTopicsEnd user technology, Secure communications

    A straight answer to a difficult question

  • Using MIKEY-SAKKE: Building secure multimedia services

    Information28 Sep 2016TopicsCryptography, Secure communications

    This white paper shares thoughts on how to build a secure multimedia service.

  • Provisioning and securing security certificates

    Guidance26 Sep 2016TopicsNetwork security, Secure communications

    How certificates should be initially provisioned, and how supporting infrastructure should be securely operated.

  • Security Characteristics for VPNs

    Document09 Sep 2016TopicsIT infrastructure, Network security, Secure communications, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • MIKEY-SAKKE frequently asked questions

    Guidance08 Aug 2016TopicsCryptography, Secure communications

    A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.

  • Security Procedures Windows Server 2012 R2 IPsec Security Gateway

    Document01 Aug 2016TopicsSecure communications, Network security

    These security procedures provide guidance in the secure operation of Windows Server 2012 R2 in relation to operation as an IPsec Security Gateway.

  • Security Procedures Cryptify Call

    Document01 Aug 2016TopicsFlexible working, Cryptography, Secure communications

    These Security Procedures provide guidance in the secure operation of Cryptify Call.

  • Formal TEMPEST Certification Scheme (CFTCS)

    Information01 Aug 2016TopicsNetwork security, Secure communications

    CFTCS is the Formal TEMPEST Certification Scheme for certifying products

  • Platform TEMPEST Accreditation Scheme (CPTAS)

    Information01 Aug 2016TopicsNetwork security, Secure communications

    CPTAS testing ensures that mobile platforms undergo First of Type assessments by an accredited test facility

  • Security Procedures Becrypt Disk Protect Foundation Grade

    Document01 Aug 2016TopicsFlexible working, Identity and passwords, Secure communications, Assurance

    These security procedures provide guidance on the secure operation of Becrypt Disk Protect.

  • Assured Service (CAS) Service Requirement Telecommunications

    Document01 Aug 2016TopicsGovernment strategy, Secure communications

    This document describes requirements for a particular type of assured service for assessment and certification under the CAS Scheme.

  • Policy and Guidance Documentation Suite for CAS(T)

    Information01 Aug 2016TopicsSecure communications, Assurance
  • Security Procedures Armour Samsung Mobile

    Document18 Apr 2016TopicsIdentity and passwords, Secure communications

    Guidance in the secure operation of Armour Samsung Mobile.

  • The development of MIKEY-SAKKE

    Information31 Mar 2016TopicsIdentity and passwords, Secure communications

    Dr Ian Levy explains how the protocol underpins both public safety and enterprise secure communications.

  • Secure Chorus

    Major operators join forces to develop secure communications

    News18 Feb 2016TopicsSecure communications

    'Secure Chorus' group will promote the development of secure communication technologies for enterprise and government.

  • Desktop Email Encryption: CPA SC

    Document08 Feb 2016TopicsSecure communications, Assurance

    Email encryption products are intended to protect the confidentiality and integrity of emails in addition to providing the recipient with authentication of the sender. Desktop Email Encryption in the context of this Security Characteristic refers to an encrypted email client deployed within a ...

  • Gateway Email Encryption: CPA SC

    Document08 Feb 2016TopicsIT infrastructure, End user technology, Secure communications

    Protects the confidentiality and integrity of emails in addition to providing the recipient with authentication of the sender. Gateway Email Encryption in the context of this Security Characteristic refers to a mail transfer agent that transparently applies and removes protection for email messages ...