Listing Thumbnail

    SecureKey VPN

     Info
    Deployed on AWS
    Free Trial
    SecureKey IPsec VPN and Firewall provides next level security and performance to secure your multi-cloud networks.

    Overview

    Open image

    The SecureKey VPN connects private networks across the internet using the strongest commercially available encryption standards to protect your network. Certificate based IKEv2 with IPsec tunnel mode encryption using AES GCM 256. The entire suite of Commercial National Security Algorithms (CNSA v1.0) is supported, along with Post Quantum IPsec Key Encapsulation Mechanism (CNSA v2.0). The cloud presents a unique security challenge, one in which off the shelf Operating Systems and software do not provide sufficient protections. The SecureKey VPN is designed with security at the forefront. Combining a secure Operating System and high performance Data Plane to secure the VM in the cloud. The OS uses advanced security features including Intrusion Detection and Prevention Systems, Integrity Measurement Architecture, Disk Encryption, Trusted Launch, and locked down security settings that are not available in other commercial cloud products. Further, the SecureKey cryptographic software offers sophisticated security to protect your network encryption keys and credentials. With Multi Factor Authentication, Role Based Access Control, and Certificate plus Password security enforcement for SSH and HTTPS management. The SecureKey VPN is one of the most secure VPN solutions available to protect Multi Cloud networks.

    Highlights

    • Post Quantum, High Performance 10Gbps+ IPsec VPN and Stateful and Stateless Firewall
    • Patent-Pending SecureKey Cryptography to protect Certificates, Private Keys, and Encryption Keys in Memory
    • Intuitive Web UI, REST API, and Command Line Interface, free python client libraries and Terraform Modules for automated deployment

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux v1.0

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 7 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    SecureKey VPN

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (224)

     Info
    • ...
    Dimension
    Cost/hour
    c6id.2xlarge
    Recommended
    $0.16
    r5n.2xlarge
    $0.16
    r6in.4xlarge
    $0.32
    h1.4xlarge
    $0.32
    m6i.12xlarge
    $1.28
    m5ad.2xlarge
    $0.16
    r6i.8xlarge
    $0.64
    x2iezn.4xlarge
    $0.32
    i3.4xlarge
    $0.32
    m6idn.4xlarge
    $0.32

    Vendor refund policy

    No Refunds Accepted

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    SecureKey version 2.4

    Confidential VM support for AMD SEV & SEV-SNP in AWS, Azure, and Google Cloud

    Integrity Measurement Architecture (IMA) integrations and enhancements (improved intrusion prevention and detection)

    SELinux policy enhancements (improved intrusion detection and prevention)

    System report now includes IMA policy, IMA violations, and SELinux enforcement status

    Audit Log now available over REST API and Web UI

    Improved storage encryption for private keys, open CSRs, and certificates

    TPM 2.0 support for disk encryption keys

    Expanded test and validations on more VM sizes in AWS, Azure, and Google Cloud

    Update kernel and drivers for AWS infrastructure

    Terraform Modules released to support AWS SecureKey VPN deployment

    Bug Fixes:

    Web UI updates, enhancements, and bug fixes

    see full release notes at https://sk-rest-client.readthedocs.io/en/latest/release_notes.html 

    Additional details

    Usage instructions

    Online documentation is available at https://sk-rest-client.readthedocs.io/en/latest/  Launch the VM using Terraform modules available at https://github.com/JETtech-Labs/sk_vpn_terraform  see: https://sk-rest-client.readthedocs.io/en/latest/aws.html  Once the VM is started, the user must create an initial admin user with the serial console, via SSH, or web browser. see: https://sk-rest-client.readthedocs.io/en/latest/user_management.html  Initial User Creation using the Web Browser: Open a web browser at https://< Instance_Public_IP_Address >/. The standard login page will be displayed. To create the initial user, enter at least one character in the username and password fields then select login - the values used do not matter since there are no users yet. Then it will prompt for creation of an initial user. Enter a username, password, and the EC2 Instance ID. This will create an admin user which can now be used to login and manage the system. The AMI does not have a default password or credential, the user must create the initial user and password using the one time available initial user creation process. To login using SSH, the user can supply the VM instance with an SSH key when created or using the Web Browser after initial user creation see https://sk-rest-client.readthedocs.io/en/latest/user_management.html#ssh-user-management  . If an SSH public key is provided during VM creation use the following to login: Username: sk_admin SSH Key: <SSH Private Key> The system requires SSH keys to be used; using passwords for SSH is explicitly not supported for security reasons. Once SSH is authenticated and logged in, the user must then sign in with device credentials using the username and password created during the initial user creation process. Note the SSH user is not used as the device login username. All usernames and hashed passwords are stored encrypted on the VM storage disk. Encryption uses industry leading disk encryption and best practices for password management including storing only hashed passwords, enforcing minimum password length and complexity, and enforcing Role Based Access Control. User credentials including password hashes are not accessible by any user. Users may change their own passwords at any time but only admin users may change other user passwords. Passwords must be changed according to the configured password policy which is configured via Web Browser UI under System Admin. SSH user keys should be rotated according to industry best practices. The VM does not use or require AWS IAM user access or credentials. The AMI does not allow outside access users must be created by an administrator and are subject to access control restrictions based on configured system policies. Further, the AMI does not allow root user access, only administrators can manage other users. Only administrators can perform the following system operations: system updates https://sk-rest-client.readthedocs.io/en/latest/updates.html , manage and access audit logs https://sk-rest-client.readthedocs.io/en/latest/system_monitor.html , and set system security policies https://sk-rest-client.readthedocs.io/en/latest/security_config.html 
    System updates are provided for free and require an internet connection. Updates may be performed by a system administrator only. Updates are managed and distributed by JET Technology Labs Inc. Updates should be performed regularly to ensure the security of the system. Technical Support is available by emailing info@jettechlabs.com . Responses typically take 1-2 business days. Technical support may reach out for more information or setup a call to resolve your issue. For technical support contact: info@jettechlabs.com 

    Resources

    Vendor resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.