Infobülletään
IT ja andmeturbe lahenduste lisandväärtuse jaotus

Find more information on the product website.

Find more information on the product website.

About Egosecure

Egosecure have been the innovation leader in the field of comprehensive data security for more than 10 years. The first product was developed and released in 2005 in Ettlingen, Baden Wurttemberg (Germany), where the company is located. Since then it was able to win more than 2,000 customers of all sizes and many sectors.

 

EgoSecure Data Protection combines the analysis of the data flow and the protection of data in one solution. For analysis of the data flow is offered the INSIGHT module. The protection of data can be configured individually with the 20 PROTECTION MODULES, which are based on the C.A.F.E MANAGEMENT PRINCIPLE.
Integrated functions graph:
ego-secure-functions
Buzzwords: encryption of HDD/removable media/folder/cloud/network/mail/android/ios, pre-boot, content filter, access control to cloud, device management, PC audit, MDM, application control, secure erase no restore

About Yubico

Yubico changes the game for strong authentication, providing superior security with unmatched ease-of-use. YubiKey, is a small USB and NFC device supporting multiple authentication and cryptographic protocols. With a simple touch, it protects access to computers, networks, and online services for the world’s largest organizations. Yubico sets world standards as a leading contributor to the FIDO Universal 2nd Factor open authentication protocol and their technology is loved by millions of users in more than 160 countries.

Yubikey is used for:

FOR PERSONAL USE
Yubikeys work instantly with leading online services including Facebook, Gmail, Dropbox, password managers, and much more.
FOR BUSINESSES
YubiKeys and YubiHSMs are trusted by millions of users at small, medium, and large businesses — including 9 of the top 10 internet enterprises.
FOR DEVELOPERS
Yubico offer open source software, documentation, and tools as well as a technical forum for discussions.
Buzzwords: 2FA, two factoris, internet key, online account breach prevention, secure access, secure login, OTP, sertificate, HSM, password managent, identity management, computer log in. PKI
Please wait...

Subscribe to our newsletter

The latest data security solutions information in your e-mail box.