There are two separate computer networks, two different systems on every employee's desk and twice the normal number of servers storing data at Cryptography Research.
To keep hackers out of the network the company runs disparate and unconnected networks—an A network for sensitive data and core engineering work that is not connected to the Internet, and a B network used for e-mail, Web surfing and other Internet activities.
"We built the networks out at least 10 years ago as soon as we started getting really sensitive client data," says Paul Kocher, founder and president of Cryptography Research. "We had to decide whether to secure the infrastructure that was connected to the outside, or to build a parallel system. We have been repeatedly thankful we did what we did and have never looked back."
View Full Article
No entries found