1 / 11

Secure Systems Ultimate Access Control and Data Protection

Secure Systems Ultimate Access Control and Data Protection. Physical and Logical Access Total SSO and Password Automation Disk/Data Encryption Centralized management system Biometric user presence monitoring Data Leakage Prevention system Custom projects.

jam
Download Presentation

Secure Systems Ultimate Access Control and Data Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure SystemsUltimate Access Controland Data Protection • Physical and Logical Access • Total SSO and Password Automation • Disk/Data Encryption • Centralized management system • Biometric user presence monitoring • Data Leakage Prevention system • Custom projects

  2. Customizable and Modular Solutions We are offering a set of modular security solutions perfectly integrated together. Each module can be used separately or in combination with others. Furthermore functionality of each module can be additionally customized to match specific customer needs and to use existing infrastructure or software. Being a direct developer allows us having true flexibility and extendibility managed from a single point.

  3. Logical AccessSecurity and Convenience The following factors can be used separately or in combination in our logical security concept: • Smartcards/USB tokens (reader-less smartcards) - secure hack-proof devices • Biometric authentication (face and/or voice)Verifies employees biometrically by using face and/or voice channels.

  4. SmartcardsA Secure portable data storage Our software relies on smartcards/tokens as a secure portable storage for... Windows Account(s) Encryption Keys Password records Policies and other data Smartcard data is secured by PIN and is hack-proof

  5. Practical Security SuiteFree Your Mind • Smartcard/token + PIN replaces all other authentication requests. Can be combined with biometric authentication. • Employees do not have to remember or even know their authentication data, user name/password combinations for all Windows programs and WEB sites. • Administrative policy may prevent users from viewing and changing some or all data stored on their devices.

  6. Practical Security SuiteUse smartcards to… Logon to Windows securely Encrypt employee files, local, removable andremote storage. Secure communications. Authenticate to all Windows programs and WEB sites automatically, without typing any passwords (Single-Sign-On) Remotely control use and data on employee smartcards via centralized TMS server And much more…

  7. Total Single-Sign-Onis a part of the suite Password Manager (SSO) extends and, if necessary, automates all password requests across the system. Native Windows authentications (32/64 bits) Remote Desktop Lotus Notes Internet Explorer Java programs Firefox Skype All WEB authentications SAP clients Google Chrome Adobe Acrobat/Reader and anything else Microsoft Office is freed from manual login

  8. Biometrics with Logical AccessUse it in combination or standalone Biometrics adds another authentication layer to smartcards or can be used standalone. It can be effectively combined with Single-Sign-On function, replacing all passwords across the system. In both cases user presence in front of the PC is monitored and access to either user session or activated programs is locked. Everything is automatically restored once user comes back. According to customer wish we add a protection against eavesdropping by detecting multiple faces in front of the PC and locking the access.

  9. Physical AccessRFID tag + Biometric verification (face) • Physical Access solution combines facial recognition biometrics, use of RFID tags and electronic locks for reliable 2-factor physical access control. • Use of RFID tagscombinedwith biometricverificationof an employee

  10. Data Leakage Prevention We offer a Data Leakage Prevention (DLP) system on top of the security suite. DLP is a centrally managed client-server solution which secures sensitive company data by not only encrypting user workspace, but as well protecting files and company data from unauthorized copying and distribution by employees. DLP allows employees to work with company data using their standard programs and tools. At the same time they cannot export, print, send out or even exchange the sensitive data through clipboard to unauthorized locations or programs.

  11. And Finally…What makes us special • We create modular and practical security and process automation products. • We do not only sell them as they are, but offer custom combined solutions perfectly matching customer needs. • We design, develop and deploy specific solutions together with our customers or their system integrators. • Everything is possible... this is our motto.

More Related