Overview
Web UI Dashboard View
Web UI Dashboard View

Product video
The SecureKey VPN connects private networks across the internet using the strongest commercially available encryption standards to protect your network. Certificate based IKEv2 with IPsec tunnel mode encryption using AES GCM 256. The entire suite of Commercial National Security Algorithms (CNSA v1.0) is supported, along with Post Quantum IPsec Key Encapsulation Mechanism (CNSA v2.0). The cloud presents a unique security challenge, one in which off the shelf Operating Systems and software do not provide sufficient protections. The SecureKey VPN is designed with security at the forefront. Combining a secure Operating System and high performance Data Plane to secure the VM in the cloud. The OS uses advanced security features including Intrusion Detection and Prevention Systems, Integrity Measurement Architecture, Disk Encryption, Trusted Launch, and locked down security settings that are not available in other commercial cloud products. Further, the SecureKey cryptographic software offers sophisticated security to protect your network encryption keys and credentials. With Multi Factor Authentication, Role Based Access Control, and Certificate plus Password security enforcement for SSH and HTTPS management. The SecureKey VPN is one of the most secure VPN solutions available to protect Multi Cloud networks.
Highlights
- Post Quantum, High Performance 10Gbps+ IPsec VPN and Stateful and Stateless Firewall
- Patent-Pending SecureKey Cryptography to protect Certificates, Private Keys, and Encryption Keys in Memory
- Intuitive Web UI, REST API, and Command Line Interface, free python client libraries and Terraform Modules for automated deployment
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
---|---|
c6id.2xlarge Recommended | $0.16 |
r5n.2xlarge | $0.16 |
r6in.4xlarge | $0.32 |
h1.4xlarge | $0.32 |
m6i.12xlarge | $1.28 |
m5ad.2xlarge | $0.16 |
r6i.8xlarge | $0.64 |
x2iezn.4xlarge | $0.32 |
i3.4xlarge | $0.32 |
m6idn.4xlarge | $0.32 |
Vendor refund policy
No Refunds Accepted
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
SecureKey version 2.4
Confidential VM support for AMD SEV & SEV-SNP in AWS, Azure, and Google Cloud
Integrity Measurement Architecture (IMA) integrations and enhancements (improved intrusion prevention and detection)
SELinux policy enhancements (improved intrusion detection and prevention)
System report now includes IMA policy, IMA violations, and SELinux enforcement status
Audit Log now available over REST API and Web UI
Improved storage encryption for private keys, open CSRs, and certificates
TPM 2.0 support for disk encryption keys
Expanded test and validations on more VM sizes in AWS, Azure, and Google Cloud
Update kernel and drivers for AWS infrastructure
Terraform Modules released to support AWS SecureKey VPN deployment
Bug Fixes:
Web UI updates, enhancements, and bug fixes
see full release notes at https://sk-rest-client.readthedocs.io/en/latest/release_notes.htmlÂ
Additional details
Usage instructions
Online documentation is available at https://sk-rest-client.readthedocs.io/en/latest/Â
Launch the VM using Terraform modules available at https://github.com/JETtech-Labs/sk_vpn_terraform see: https://sk-rest-client.readthedocs.io/en/latest/aws.htmlÂ
Once the VM is started, the user must create an initial admin user with the serial console, via SSH, or web browser. see: https://sk-rest-client.readthedocs.io/en/latest/user_management.htmlÂ
Initial User Creation using the Web Browser: Open a web browser at https://< Instance_Public_IP_Address >/. The standard login page will be displayed. To create the initial user, enter at least one character in the username and password fields then select login - the values used do not matter since there are no users yet. Then it will prompt for creation of an initial user.
Enter a username, password, and the EC2 Instance ID. This will create an admin user which can now be used to login and manage the system. The AMI does not have a default password or credential, the user must create the initial user and password using the one time available initial user creation process.
To login using SSH, the user can supply the VM instance with an SSH key when created or using the Web Browser after initial user creation see https://sk-rest-client.readthedocs.io/en/latest/user_management.html#ssh-user-management . If an SSH public key is provided during VM creation use the following to login:
Username: sk_admin
SSH Key: <SSH Private Key>
The system requires SSH keys to be used; using passwords for SSH is explicitly not supported for security reasons. Once SSH is authenticated and logged in, the user must then sign in with device credentials using the username and password created during the initial user creation process. Note the SSH user is not used as the device login username.
All usernames and hashed passwords are stored encrypted on the VM storage disk. Encryption uses industry leading disk encryption and best practices for password management including storing only hashed passwords, enforcing minimum password length and complexity, and enforcing Role Based Access Control. User credentials including password hashes are not accessible by any user. Users may change their own passwords at any time but only admin users may change other user passwords. Passwords must be changed according to the configured password policy which is configured via Web Browser UI under System Admin. SSH user keys should be rotated according to industry best practices.
The VM does not use or require AWS IAM user access or credentials. The AMI does not allow outside access users must be created by an administrator and are subject to access control restrictions based on configured system policies. Further, the AMI does not allow root user access, only administrators can manage other users.
Only administrators can perform the following system operations: system updates https://sk-rest-client.readthedocs.io/en/latest/updates.html , manage and access audit logs https://sk-rest-client.readthedocs.io/en/latest/system_monitor.html , and set system security policies https://sk-rest-client.readthedocs.io/en/latest/security_config.htmlÂ
System updates are provided for free and require an internet connection. Updates may be performed by a system administrator only. Updates are managed and distributed by JET Technology Labs Inc. Updates should be performed regularly to ensure the security of the system.
Technical Support is available by emailing info@jettechlabs.com . Responses typically take 1-2 business days. Technical support may reach out for more information or setup a call to resolve your issue.
For technical support contact: info@jettechlabs.comÂ
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.