final file mapped from WF project

Cryptography and encryption

Keep your most sensitive data secure from emerging and evolving threats with flexible, future-proof, upgradable encryption solutions from Viasat.
Encryption that goes beyond the box

Viasat protects governments across the world from evolving cyber threats and electronic warfare with a range of secure and flexible encryption solutions. We combine cutting-edge technology with the highest security standards, so you can have the highest confidence your most sensitive data is protected at all times — and we believe encryption and data protection goes beyond the box, which is why we support our customers throughout their cybersecurity journey.

Edge encryption graphic with hundreds of numbers lit up in vibrant blues
Flexible, robust solutions

We deliver flexible, robust data security through a comprehensive range of high assurance (Type 1) network encryptor solutions that are tuneable to specific needs to protect the most sensitive data at rest and data in transit. Viasat is best-in-class at designing high-performance, low-SWaP products that are easy to transport and to install, even when handling large amounts of data — and our products are designed to seamlessly integrate with the most complex, automated, and accredited government IT infrastructures.

End-to-end service

Viasat provides end-to-end solutions and support to governments across all their cybersecurity needs — from tactical edge to cloud data centers, undersea to afloat, and from ground to air and space. Our solutions are highly tuneable, allowing customers to tailor their encryption and data protection services to meet the diverse needs of their teams and missions. We are constantly evolving our products and offerings to ensure they adapt to meet government and military evolving requirements — and we work in partnership with our customers to develop and maintain our products, helping ensure our solutions and services are tailored to their requirements.

Technology Internet Connection and Data Analysis, Digital Cyberspace with Particles and Digital Data Network Connections. Technology Digital Abstract Background. 3d rendering
Binary code, ones and zeros in a 1970 dot matrix font on a computer screen. An infinity and lens bokeh effect applied.
Pioneering technology backed by heritage and experience

Our 35+ year heritage of building communications and encryption products, paired with expert analysis of data across our global ISP network, gives us a diverse view of the global cyber threat landscape. Our products are NSA-certified to meet the highest security standards required by governments around the world, future-proofed and upgradable to adapt to evolving threats, and scalable with demand to ensure reliability — even when working with data-heavy technologies such as cloud interconnect or AI.

Related products and services
Integrated key in electronic computer circuit board
Cloud & enterprise solutions

Confidently secure your classified network data

Concept of quantum computing with high speed binary numbers code.
Space solutions

Complete space-to-ground encryption

Edge security graphic that looks like a keyhole lit up in vibrant blue surrounded by various cyber elements
Edge solutions

Keeping classified communications secure, even at the tactical edge

The appearance of U.S. Department of Defense (DoD) visual information does not imply or constitute DoD endorsement.

" class="hidden">张掖天气预报