Really anything you send over the internet is safe if you encrypt it first. Internet is just a pipe and if the content is encrypted it doesn't matter what pipe it uses to get to the destination. If you want a secure connection dedicated to non encrypted content you are dreaming because the only way to achieve that is running a cable between two computers with nothing else connected.
Some companies use a dedicated hardware encoder that encrypts traffic and sends it over standard HTTP, where on the other end it is decoded by a matching hardware decoder. Anyone receiving the data in between the two boxes gets junk and it doesn't require using special ports or protocols.
This is a
VERY simplistic view of Internet security.
Like another post said, it addresses only one part of the issue.
The "ideal" form of security is theoretically a "one time pad". It is a type of encryption that uses a shared key to encrypt data. The issue is that for it to be perfect encryption, the cypher has to be exactly as long as the message and must be shared in advance through another (off-line) channel that itself is perfectly secure and impossible to guess.
Obviously, this isn't practical on the Internet, so we have trade-offs between simplicity, usability, speed and security. In the past, some people have made very poor decisions. Encryption such as "WEP" encryption in the old 802.11b (Wifi) standard is a legitimate stream cypher encryption, but it was handled very poorly making it vulnerable to attack. Today, with modern CPUs and algorithms it is a trivial task to decrypt this encryption using statistical attacks against the initialization vectors that construct the stream.
So simply saying
"anything you send over the internet is safe if you encrypt it " is patently not true. The same goes for a number of other "encrypted" streams such as various old forms included in things like ZIP files and Word Documents. There are other examples, like DES-48, which are considered breakable today through sheer brute-force keyspace attacks.
Of course, the "hardware encoder" he's talking about is probably some misunderstanding of either a VPN (which has nothing to do with HTTP) and SSL/TLS via HTTPS, (which does have to do with HTTP, but frequently nothing to do with a dedicated "hardware encoder"). Regardless, sure VPNs are good, but it depends greatly on how it is configured.
There is the encryption layer, which can rely on something like AES via IPSEC or 3DES via PPTP. There is also the session initialization protocol (something like IKE), which allows the initial key sharing and usually requires some sort of credentials. I have seen many companies who's VPN uses the password "cisco" on their Cisco IPSEC VPN. While the VPN itself may appear secure, it's not because an attacker can easily guess the session initialization key.
So, like I said before, this topic MOST CERTAINLY is not simple. It's not even close to as simple as "feredim" implied in his first question and it's not really nearly as simple as "seepy" implied either.
But it sure is an interesting topic!