Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Secure Remote Access Partnership Using Optical Tokens

BeCrypt : 01 August, 2012  (Company News)
Becrypt has partnered with DMS to create ultra-secure endpoint protection with high level user authentication
Secure Remote Access Partnership Using Optical Tokens
Becrypt has announced new versions of its endpoint security solutions, developed in partnership with Distributed Management Solutions (DMS) that provide extra protection against cloning and phishing attacks. Integrated with Becrypt’s Trusted Client secure remote access solution and tVolution, its ultra secure virtual desktop offering, DMS’ CASQUE SNR enables users to authenticate the host computer when logging in remotely, as well as allowing the host to authenticate the user. This two way authentication provides assurance that the host computer website has not been hijacked by a fraudulent site masquerading as the intended host, for example, during a phishing attack. Together, the solutions allow organisations to cost effectively and securely enable mobile and home working across public networks as well as providing cloud computing with EndPoint and Identity integrity assurance.

Becrypt’s tVolution is hardware agnostic and can run on existing desktop machines or thin client devices, without the need for a traditional Windows operating system and, moreover, it provides customisable hardened clients.

CASQUE SNR, which has been shortlisted in the Digital Entrepreneur Awards for Security Innovation of the Year, provides authentication both of the user and the host computer when logging on remotely. A hand held, credit-card sized device, the CASQUE Token receives and displays text messages when held in front of the screen. The Token is “active” with its keys dynamically changed. CASQUE detects attempts at cloning of authentication tokens, automatically recovers from Insider attacks and denies phishing attacks. A version of CASQUE for UK Government – CASQUE HMG - is currently undergoing CESG certification for use at Impact Level 3, expected to be approved this Autumn.

The CASQUE client has been adapted for use with Trusted Client, Becrypt’s multi-award winning secure remote access solution that provides a self-contained, encrypted environment to allow employees to connect to an organisation’s network and data. Both Trusted Client and tVolution are ‘CASQUE enabled’ with no further modification required, enabling companies with large numbers of users to deploy the solutions immediately.

Basil Philipsz, Managing Director of Distributed Management Systems, said: “Cyber security continues to be a critical issue for all organisations. With increased remote working and use of cloud computing the need to confirm user identity when logging onto an organisation’s assets is paramount. We have developed CASQUE to provide assured, secure remote access, protecting an organisation’s network and systems, yet supporting the flexibility of mobile working. We are delighted to be partnering with Becrypt, a well known leading independent supplier of innovative Information Assurance solutions and services, to provide customers with a robust, secure EndPoint-to-Host solution.”

Bernard Parsons, CEO of Becrypt said; “DMS’ focus on delivering innovative technologies to provide high assurance authentication parallels our work in providing organisations with solutions to manage access to their corporate network and files, even those in vulnerable locations, in the most cost efficient and effective ways. Through working with Technology Partners and OEMS we are able to strengthen the range of Endpoint solutions that we able to deliver to our customers.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo