Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright CryptoTec AG 2015 1 Communication in stealth mode.

Similar presentations


Presentation on theme: "Copyright CryptoTec AG 2015 1 Communication in stealth mode."— Presentation transcript:

1 copyright CryptoTec AG 2015 1 Communication in stealth mode

2 copyright CryptoTec AG 2015 2 About us iDev Gmbh IT security expert ISTQB certification in the area of quality management Business environment is the sports betting industry with billions of turnover CryptoTec AG Goal: high security encrypted data management Technology & usability united Cryptographic systems copyright CryptoTec AG 2015 2

3 3 Internet threat copyright CryptoTec AG 2015 3

4 4 Internet threat

5 copyright CryptoTec AG 2015 55 Internet threat copyright CryptoTec AG 2015

6 66 Internet threat copyright CryptoTec AG 2015

7 7 Cybercrime New dimension of threat copyright CryptoTec AG 2015 7

8 8 Cybercrime Attacks from the inside and via social engineering Huge data storage devices Industrial espionage Centralized servers VPN Webbrowser Invitation by e-mail (containing links) Hacker copyright CryptoTec AG 2015 8 New dimension of threat

9 copyright CryptoTec AG 2015 9 CryptoTec Zone Encrypted communication & highly secure file transfers Intuitive – straightforward – timesaving copyright CryptoTec AG 2015 9

10 10 Preventive – CryptoTec Zone CryptoLib ensures end-to-end encryption CryptoStorage garantees that all data will only be transferred & stored encrypted Usability & maximum performance (faster than VPN) Automated cryptography CryptoTec Zone only allows authorized CryptoIDs Closed User Group (CUG) Monitoring 2.0 Workflow unimpaired: - Delta Coding optimized - Standard applications (MS Office) useable copyright CryptoTec AG 2015 10

11 copyright CryptoTec AG 2015 11 copyright CryptoTec AG 2015 11

12 copyright CryptoTec AG 2015 12 100% protection against unauthorized access by: Administrators and staff Softwaredevelopers and providers Service providers (Mail, Cloud, Mobile, Internet, WLAN) TC & IT providers Organzied crime Hackers Intelligence services and foreign authorities Highsecurity solution Access protection copyright CryptoTec AG 2015 12

13 copyright CryptoTec AG 2015 13 Become an IT security expert Integration into Workflow Customizing Modular extensions (Change according to development) Human and M2M communication Redundant and fully encrypted high security servers Operation of the Trust Center copyright CryptoTec AG 2015 13

14 copyright CryptoTec AG 2015 14 Exponential growth of the IT security budget copyright CryptoTec AG 2015 14

15 copyright CryptoTec AG 2015 15 Academic Alliance Free software version Intellectual property must be protected Friedrich-Alexander-University Erlangen-Nuremberg RWTH Aachen University UZH Zurich https://www.cryptotec.com/aa copyright CryptoTec AG 2015 15

16 copyright CryptoTec AG 2015 16 Thank you for your attention CryptoTec AG Spichernstr. 73 50672 Köln T: +49221 222 8383 0 F: +49221 222 8383 20 info@cryptotec.com www.cryptotec.com

17 copyright CryptoTec AG 2015 17 Any questions ?


Download ppt "Copyright CryptoTec AG 2015 1 Communication in stealth mode."

Similar presentations


Ads by Google