Whom do you trust when buying secure network communications equipment? The systems that your company relies on to bounce off unauthorized prying eyes? These boxes should provide encryption and authentication services with the highest level of security. They must use the most advanced and secure cryptographic algorithms. Besides, they have to protect against physical tampering and safeguard from sidechannel attacks. Certification bureaus check for these basics, stating that the manufacturer did not make any gross mistakes.