archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Vasco - Data Security Solutions
    a customer base of approximately 10 000 companies in over 100 countries including more than 1 700 international financial institutions In addition to the financial sector VASCO s technologies secure sensitive information and transactions for the enterprise security e commerce and e government industries Our Vision Full option all terrain authentication Full Option All our authentication technologies solutions and services are hosted on our single unique platform VACMAN Controller All terrain VASCO brings banking security to 50 different vertical applications such as healthcare e gaming automotive human resources education administration e government legal manufacturing and many more Our Strategy VASCO is committed to providing financial institutions with an array of authentication solutions and services at the lowest total cost of ownership In addition to the financial sector VASCO technologies secure sensitive information and transactions for the enterprise security e commerce and e government industries and we are constantly enhancing our current offerings in order to better meet the specific needs of our customers within those markets VASCO Solutions VASCO has designed minimally invasive strong authentication solutions with unique feature sets to fit a wide range of industries IT infrastructures and business needs Our focus is to build competitive solutions that

    Original URL path: http://dss.lv/en/razotaji/vasco/27/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    authenticators USB authenticators Software authentication Mobile authentication SMS delivery Smart cards Where to use Remote access to internal networks via SSL VPN and browser based applications Intranets and extranets Web applications Webmail access IDENTIKEY Authentication Server Overview IDENTIKEY Authentication Server is VASCO s off the shelf centralized authentication server It is the perfect choice to secure remote access to corporate resources and various types of web based applications from remote access and SSL VPN to SaaS The solution is straightforward and scalable fit to accommodate the needs of both large and small implementations It offers complete functionality and management features without the need for significant budgetary or personnel investments This results in a fast and cost effective rollout IDENTIKEY Authentication Server supports Windows and Linux operating systems on 32 bits and 64 bits platforms Commercial offer Enterprise Security IDENTIKEY is available in 3 packaged versions for Enterprise Security use The Standard Edition includes RADIUS functionality for a single licensed server It targets SMBs wanting to secure their remote access infrastructure at the lowest TCO Total Cost of Ownership The Gold Edition offers several web filters to secure in house webapplications such as Outlook Web Access RDWebAccess Citrix Web Interface and Citrix Receiver additional to the RADIUS support It also offers a Plugin module for Steel Belt Radius SBR server This version includes licenses for a primary and a back up server It is an ideal solution for SMBs that want to offer more functionality and assure availability for their employees The Gold Edition also addresses the security needs of companies that want to protect the external access to the corporate network as well as Windows desktop and network logon The Enterprise Edition is the most comprehensive solution offering RADIUS for remote access to the corporate network Web filter support for

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/strong-authentication/22/ (2013-11-15)
    Open archived version from archive

  • Cellcrypt - Data Security Solutions
    World s first interoperable secure messaging between BlackBerry iPhone and Android Running on the unmodified operating systems of off the shelf smartphones such as BlackBerry and Nokia smartphones Cellcrypt s encryption engine developed by the company at its offices in London UK has been certified to FIPS 140 2 standard approved by the US National Institute of Standards and Technology NIST Cellcrypt Mobile Baseline for BlackBerry is CESG CAPS approved CAPS CESG Assisted Products Service is a UK Government Cryptographic Evaluation Service run by CESG the UK s National Technical Authority for Information Assurance Achieving CAPS certification enables UK Government departments to use Cellcrypt Mobile Baseline to meet their Baseline IL3 RESTRICTED security needs See full announcement for more details Cellcrypt has local partners worldwide that provide voice security consulting services including reselling and implementing Cellcrypt based solutions In addition Cellcrypt is proud to have several strategic alliances including RIM BlackBerry Inmarsat and AT T Cellcrypt is a privately held company backed by a leading venture capital company in the defense and security space Porton Capital Over the last 10 years Porton Capital has grown into one of the UK s leading specialist venture capital firms with specific focus on defense and security technology businesses Formed by former UBS investment bankers Porton Capital manages over 250M under a variety of investment funds Cellcrypt enables mobile personnel to use off the shelf cell phones to communicate securely and easily without changing their normal calling routine Securely call other cell phone users Securely call office landlines Securely access office voicemail Securely participate in conference calls Securely access office PBX features such as calling out to any phone on the public switched telephone network The most popular off the shelf cell phones for professional use are supported including Android BlackBerry iPhone and Nokia smartphones Almost every cellular network is supported from low bandwidth GSM GPRS to high bandwidth 4G and for users with Wi Fi enabled devices calls can be made over private and public Wi Fi and satellite networks all from a single device Key Benefits of Cellcrypt Solutions Ease of Use Management Easy to use mobile software application with intuitive user interface that makes a secure call as easy as making a normal call No additional hardware necessary Industry standard downloadable application that can be deployed in minutes anywhere in the world and controlled using standard device management software Application can be installed updated and deleted remotely on to any supported device with access to the internet including pre paid devices or devices with no SIM cards Management console instantly disables user Trustworthy Security Flexibility Interoperability and Scalability Government grade encryption Publicly certified Cryptography validated by US National Institute of Standards Technology NIST to FIPS 140 2 certificate 1310 End to end encryption even if a call is intercepted it can t be decrypted Double wrapped algorithms every cryptographic calculation uses two algorithms in case one becomes vulnerable in the future On device software controlled key management avoids vulnerabilities of keys

    Original URL path: http://dss.lv/en/razotaji/cellcrypt/6/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    IP rather than voice channel so both devices also need to be connected to the internet using standard data connectivity provided by the service provider Government grade cryptography is used to check the identity of each device on the call and then encrypt the call The recipient s phone rings or vibrates automatically shows the Cellcrypt Mobile screen and displays an incoming call If the call is accepted a normal conversation is conducted until one of the callers hangs up The caller is notified if the recipient is busy or not online Secure Messaging on Android BlackBerry and iPhone To counter interception vulnerabilities of standard SMS and IM Cellcrypt Mobile includes a secure messaging feature which brings end to end encryption to textual messages Cellcrypt Mobile s encrypted messaging sends secure messages directly between BlackBerry Android and iPhone smartphones Designed for real time short lived messages similar to information exchanged via voice calls Cellcrypt Mobile delivers encrypted messages directly when both parties are connected This avoids the storing and forwarding of messages which users typically don t want when sending time sensitive information preferring instead that the messages be sent immediately and deleted as soon as read Cellcrypt Mobile delivers encrypted voice calls using government certified public key and symmetric cryptography and its secure messaging uses the same architecture but sends text data rather than voice data Secure In any product security is only as strong as The strength of the encryption it uses The security of the secret keys used to unlock the encryption The integrity of the product implementation and the trustworthiness of the supplier Cellcrypt Mobile uses encryption algorithms that are recommended for military and government secure communications and its secret keys never leave the mobile device The product has been tested by third parties and validated to several government standards including US NIST FIPS 140 2 certificate 1310 for its cryptography High Performance All communications products that rely on cellular networks are dependent on the strength availability and reliability of the underlying radio network for their performance Cellcrypt understands this industry problem and is one of few companies to deliver specific technology solutions for optimizing performance in poor and variable wireless conditions including its Encrypted Mobile Content Protocol and Encrypted Content Delivery Network Cellcrypt Mobile automatically switches to the highest quality network that the handset is connected to so that Wi Fi is selected in preference to cellular networks Also calls work across changing cellular networks for example if a 3G connection is degraded by the carrier to an EDGE or GPRS connection even as the call is in progress Callers can be on different networks in different countries for example Wi Fi at one end and GPRS at the other Easy to Set Up Setting up Cellcrypt Mobile on a cell phone is easy Users send a serial number of their phone to Cellcrypt and the secure number they want to use The Cellcrypt Mobile software application is then transferred to the user for installation

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/voice-call-and-sms-encryption/35/ (2013-11-15)
    Open archived version from archive

  • Centrify - Data Security Solutions
    one single login for users and one unified identity infrastructure for IT Centrify s software and cloud services let organizations securely leverage their existing identity infrastructure to centrally manage authentication access control privilege management policy enforcement and compliance across on premise and cloud resources More than 4500 customers have deployed Centrify across millions of servers applications and mobile devices to optimize costs and increase agility and security With Centrify organizations are reducing their costs associated with identity lifecycle management and compliance by over 50 Founded in 2004 by Tom Kemp Adam Au and Paul Moore Centrify is headquartered in Sunnyvale California with additional development and regional offices in Seattle Hong Kong London Munich Brisbane and Sao Paulo Centrify is a privately held company backed by top tier venture capital firms Mayfield Accel Partners INVESCO Private Capital Sigma West and Index Ventures These investors have funded some of the world s most successful technology companies including Citrix Facebook Veritas JBoss MySQL Riverbed and Skype Our partners include Microsoft Samsung Apple Red Hat Canonical and others To date the company has over 4 500 customers including nearly half of the Fortune 50 Since releasing its initial product in 2005 Centrify has expanded

    Original URL path: http://dss.lv/en/razotaji/centrify/7/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    leveraging an infrastructure you already own Active Directory Centrify Suite 2013 allows organizations to quickly and effectively meet compliance requirements and mitigate risks from internal threats while at the same time reducing operational costs The new features in Centrify Suite 2013 further empower enterprises to easily consolidate identities and secure privileged user access across UNIX Linux and Windows systems An integrated solution Centrify Suite 2013 consisting of DirectManage 5 1 DirectControl 5 1 DirectAuthorize 3 0 DirectAudit 3 0 and DirectSecure 1 3 enables secure authentication identity consolidation privileged access management and detaile d privileged user auditing across th e broadest set of platforms deployed on premise and in the cloud Centrify Suite 2013 builds on the core enhancements Centrify introduced in Suite 2012 by extending DirectAuthorize to Windows providing tighter integration between DirectAudit and DirectAuthorize and providing wizards and tools to make migration from Centrify classic Zo nes to hierarchical Zones incredibly easy In addition Centrify Suite 2013 introduces a collection of new features to make migration from legacy SUDO environments fast and simple All this makes Centrify Suite 2013 the industry s easiest and most scalable solution for unified identity and privilege management and detailed user auditing across UNIX Linux and Windows systems Centrify Delivers Windows Privilege Management to Mitigate Internal Threats to Systems On Premise and in the Cloud Centrify is pleased to announce Centrify Suite 2013 which offers a comprehensive approach to identity management that includes integrated authentication access control privilege management policy enforcement and compliance all based on a single unified architecture that leverages Microsoft Active Directory New in this Release DirectAuthorize for Windows To complement our existing solution for Linux and UNIX privilege management Centrify now introduces seamlessly integrated least privilege access management for Windows servers Centrify DirectAuthorize for Windows eliminates the problem of

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/identify-and-access/17/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    for Linux UNIX systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Linux UNIX but for Windows as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers DirectAuthorize for Windows Role Based Privilege Management for Windows Strengthen security for Windows systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Windows but for Linux UNIX as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers Net net DirectAuthorize for Windows is the perfect solution to restrict and protect both high privileged domain accounts as well as local accounts with administrative privilege DirectAudit Detailed Auditing of Privileged User Sessions on UNIX and Linux Systems DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis To learn more about DirectAudit DirectAudit for Window s Detailed Auditing of Privileged User Sessions on Windows DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With Centrify s award winning DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis DirectSecure Dynamically Segment and Isolate Cross Platform Systems Leverage your existing Active Directory infrastructure to secure access to sensitive information in mixed Windows UNIX and Linux environments Centrify DirectSecure is a policy based software solution that secures sensitive information by dynamically isolating and protecting cross platform systems and enabling optional end to end encryption of data in motion By leveraging your existing Active Directory infrastructure and the native IPsec support built into today

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/ (2013-11-15)
    Open archived version from archive

  • ForeScout - Data Security Solutions
    to grant network access from more types of people employees guests contractors to more types of devices laptops smartphones tablets via more types of access methods wired wireless VPN The IT challenge is how to do this without compromising security and risking problems such as unauthorized data access and leakage attacks by zero day threats policy violations spurred by VM sprawl and unwelcome applications The Answer ForeScout CounterACT ForeScout solves the accessibility challenge with a family of automated solutions for network access control mobile security threat prevention and endpoint compliance ForeScout s solutions empower organizations to gain access agility while preempting risks and eliminating remediation costs ForeScout CounterACT allows IT organizations to readily understand and control how all users systems and devices including mobile devices and VMs access network resources and applications Once you configure your security policies within CounterACT the system automatically enforces network access policy controls mobile and personal device access eliminates network intrusion threats finds and fixes gaps in endpoint security ForeScout CounterACT can dynamically remediate violations such as an out of date anti virus a misconfigured personal firewall or de activated encryption software without help desk and operations intervention ensuring endpoint integrity and saving our customers time and money ForeScout s CounterACT platform is fast flexible and easy for administrators to deploy manage and maintain Everything is contained within a single appliance that seamlessly integrates into your existing environment offering day one results with no changes to your network While CounterACT can identify and provide network based control mechanism for managed and personal mobile devices ForeScout s mobile security product line provides a flexible means to effectuate bring your own device policy The mobile security suite offers native iOS and Android device level security mobile device management MDM integration as well as a cloud based enterprise

    Original URL path: http://dss.lv/en/razotaji/forescout/8/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-20