Certified product

ViaSat UK Eclypt 600/Enhanced

Version:  v3.1, v3.2, v3.4.1 and v3.5
Product Type:  Data encryption
Grade:  Commercial: Enhanced, Commercial: OFFICIAL, High Grade Top Secret
Products in Evaluation
Data at rest at Tier 2 or above should be protected by a High Grade product. Where this is not an option, an assured hardware-based solution should be preferred as part of a risk managed process. Eclypt 600 may be used in a risk managed solution to protect SECRET and TOP SECRET information, when used in accordance with the NCSC Security Procedures and CIAN 2015/03. Additional risk information is available from NCSC via CAPS team.

Eclypt 600/Enhanced secures data via one Clearview password and one Touch-Memory Token or KeyStone USB Token. This product has a lifetime key and should be keyed to the same Protective Marking as the data. Please refer to the Security Procedures for further guidance and information.

Eclypt 600/Enhanced drives are available in three variants:

1) Eclypt Core Internal drive:

  • Direct replacement for the existing hard disk
  • Available in Rotating (HDD) or Solid State (SSD) variants
  • Easily retro-fitted or available factory fitted

2) Eclypt Freedom USB drive:

  • High capacity USB drive
  • Data can be securely backed up or transported
  • Available in Rotating (HDD) and Solid State (SSD) variants

3) Eclypt Nano Portable drive:

  • Portable USB drive
  • SLC memory for increased performance reliability and longevity
  • Rugged waterproof construction designed to meet MIL-STD 810G standard

Eclypt Technology integrates sophisticated authentication entire disk encryption and data storage into tamper resistant tamper evident hardware that safeguards data. Data is protected even if lost or stolen.

  • Protects every single sector with 256-bit AES encryption
  • Stores no plain text
  • Compatible with all applications and O.S. patches
  • Supports imaging partitioning and diagnostic applications
  • Supports multiple users (up to 128)
  • Life time key there is no need to ever change the key
  • Requires no ongoing maintenance and no specialist IT knowledge
  • Encrypts and decrypts data transparently and with no noticeable effect on the computer performance

The following Security Procedures apply:

  • Eclypt HMG Issue No.2.0 January 2010
  • Eclypt Freedom HMG Issue No.2.0 January 2010
  • Eclypt Nano HMG Issue No.1.0 October 2011

These documents are available from the NCSC Enquiries team.

Certified under NCSC scheme

Was this information helpful?

We need your feedback to improve this content.

Yes No