Smaller and faster
Security Builder IPSec builds on Certicom’s expertise with constrained platforms and can be used to secure communication on a variety of devices. Compile the code to provide only those features you need for compact implementations and gain better performance than is normally achievable with traditional IPSec. Elliptic Curve Cryptography (ECC)-based algorithms—supported by industry leading VPN Gateways—enable faster key exchanges, while IKEv2 provides for greater standardization and faster IPSec tunnel negotiations.
IPSec has matured into the leading VPN protocol. This maturity allows Security Builder IPSec to support a variety of cryptographic algorithms including 3DES, AES, ECDH, RSA, Diffie-Hellman, SHA-1, SHA-2, MD5 and EAP. Security Builder IPSec also provides authentication support for one-time-password tokens (i.e. SecurID or Safeword). This can be further extended to provide support for smartcards and cryptographic hardware acceleration.
Immediate VPN compatibility
With most other IPSec toolkits, a developer must test and create a compatible implementation with each individual VPN gateway vendor. Security Builder IPSec includes pre-defined profiles that allow immediate compatibility with most leading VPN gateway vendors. Certicom continually monitors VPN compatibility and adds new features regularly so that developers can focus on their primary development goals, not VPN updates.
Quickly create an end-user application
Security Builder IPSec provides the basis to develop a complete application to enable network access from a constrained device. Certicom Professional Services can help you round out the functionality and create a VPN client. Assistance could include: developing a GUI, building a driver or porting the toolkit to an additional platform.