Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.

Similar presentations


Presentation on theme: " Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric."— Presentation transcript:

1  Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric user presence monitoring  Data Leakage Prevention system  Custom projects  Physical  Physical and Logical Access  Total  Total SSO and Password Automation  Disk/Data  Disk/Data Encryption  Centralized  Centralized management system  Biometric  Biometric user presence monitoring  Data  Data Leakage Prevention system  Custom  Custom projects

2 We are offering a set of modular security solutions perfectly integrated together. Each module can be used separately or in combination with others. Furthermore functionality of each module can be additionally customized to match specific customer needs and to use existing infrastructure or software. Being a direct developer allows us having true flexibility and extendibility managed from a single point.

3  Smartcards/USB tokens (reader-less smartcards) - secure hack-proof devices The following factors can be used separately or in combination in our logical security concept:  Biometric authentication (face and/or voice) Verifies employees biometrically by using face and/or voice channels.

4 Our software relies on smartcards/tokens as a secure portable storage for... Smartcard data is secured by PIN and is hack-proof

5  Smartcard/token + PIN replaces all other authentication requests. Can be combined with biometric authentication.  Employees do not have to remember or even know their authentication data, user name/password combinations for all Windows programs and WEB sites.  Administrative policy may prevent users from viewing and changing some or all data stored on their devices.  Smartcard/token + PIN replaces all other authentication requests. Can be combined with biometric authentication.  Employees do not have to remember or even know their authentication data, user name/password combinations for all Windows programs and WEB sites.  Administrative policy may prevent users from viewing and changing some or all data stored on their devices.

6 Logon to Windows securely Encrypt employee files, local, removable and remote storage. Secure communications. Authenticate to all Windows programs and WEB sites automatically, without typing any passwords (Single-Sign-On) Remotely control use and data on employee smartcards via centralized TMS server And much more… Logon to Windows securely Encrypt employee files, local, removable and remote storage. Secure communications. Authenticate to all Windows programs and WEB sites automatically, without typing any passwords (Single-Sign-On) Remotely control use and data on employee smartcards via centralized TMS server And much more…

7 Password Manager (SSO) extends and, if necessary, automates all password requests across the system. All WEB authentications Native Windows authentications (32/64 bits) Java programs SAP clients and anything else is freed from manual login Remote Desktop Microsoft Office Lotus Notes Internet Explorer Google Chrome Firefox Adobe Acrobat/Reader Skype

8 Biometrics adds another authentication layer to smartcards or can be used standalone. It can be effectively combined with Single-Sign-On function, replacing all passwords across the system. In both cases user presence in front of the PC is monitored and access to either user session or activated programs is locked. Everything is automatically restored once user comes back. According to customer wish we add a protection against eavesdropping by detecting multiple faces in front of the PC and locking the access.

9  Physical Access  Physical Access solution combines facial recognition biometrics, use of RFID tags and electronic locks for reliable 2-factor physical access control. RFID biometric  Use of RFID tags combined with biometric verification of an employee

10 We offer a Data Leakage Prevention (DLP) system on top of the security suite. DLP is a centrally managed client-server solution which secures sensitive company data by not only encrypting user workspace, but as well protecting files and company data from unauthorized copying and distribution by employees. DLP allows employees to work with company data using their standard programs and tools. At the same time they cannot export, print, send out or even exchange the sensitive data through clipboard to unauthorized locations or programs.

11  We create modular and practical security and process automation products.  We do not only sell them as they are, but offer custom combined solutions perfectly matching customer needs.  We design, develop and deploy specific solutions together with our customers or their system integrators.  Everything is possible... this is our motto.  We create modular and practical security and process automation products.  We do not only sell them as they are, but offer custom combined solutions perfectly matching customer needs.  We design, develop and deploy specific solutions together with our customers or their system integrators.  Everything is possible... this is our motto.


Download ppt " Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric."

Similar presentations


Ads by Google