Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Fully encrypted, configurable boot capability from USB stick

BeCrypt : 11 September, 2007  (New Product)
Trusted Client from BeCrypt provides capabilities for secure remote access or thin client computing with a simple USB device
BeCrypt is showcasing its latest products at InfoSec New York. Included will be BeCrypt's Trusted Client, which was launched earlier in the year, and is now optimised to work with Juniper Networks' market-leading Secure Access SSL VPN technology to provide a solution which offers self-contained, temporary security for un-trusted hosts in un-managed environments.

BeCrypt's Trusted Client, USB key-based operating system technology, is particularly suited to government and federal IT infrastructure, as it can re-create specific levels of security accreditation on third party devices instantly with an encrypted workspace. It is also relevant for any corporate remote access strategy which encompasses business continuity and can be used to replace the use of corporate laptops completely.

Trusted Client provides a safe, configurable and bootable operating system and workspace for remote endpoint PCs via a fully-encrypted USB memory stick. Juniper Networks Secure Access SSL VPN platforms are used to create a secure and verified link between the remote endpoint and the user's corporate network resources. Thin-client applications, email and Internet access, and standalone applications can all be protected when remote users need to access network resources from third party machines, which may not provide the required levels of security.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo