BT Global Services is a leading expert in managed networked IT services. We combine products and services with industry-specific solutions and consulting expertise to deliver more efficient, streamlined and secure systems.
In the enterprise information security solution provided by Watchdata, a USB token was used as the identity carrier and stores inside it a CA that the enterprise has issued to the USB token owner. When the owner wants to access the enterprise intranet, they have to insert the USB token to the computer before the intranet system authenticates the CA inside the USB token.
Inlimitech offers proven identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security. And they're available on today's leading smartphone platforms, including the Apple iPhone, Google Android and BlackBerry.
The company has at its disposal various technologies to identify people, moving from the magnetic card to the transponder, to the reading of the number plates, to the biometric identification, and also keys manager cabinets. The feasible systems vary from the simple opening of a controlled gate without the supervision of a PC, to a huge system with hundreds of controlled gates.
Strong authentication provides more protection for sensitive information than a simple username and password can provide. Strong authentication offers assurance that transactions are conducted by two known and trusted parties. Strong authentication utilizing one-time-passcodes is a proven, reliably efficient technology.
G&D offers a wide range of high-security and innovative products that have been tried and tested around the world. The StarSign product line comprises smartcards, tokens, middleware, authentication software, mobile solutions, and card operating software, as well as a broad spectrum of additional services for authentication.
SafeSign IC enforces two- or multi factor authentication/logon to the network, client PC or application, requiring the end user to have both the USB token or smart card (something you have) and a Personal Identity Number (something you know). USB tokens and smart cards are physically and logically tamper-resistant, ensuring that the end user’s digital credentials can not be copied, modified or shared. Authentication based on smart cards or USB tokens provides the highest degree of security.
Empower employees, customers and partners with secure access to your cloud and company apps on any device. Transform your enterprise security and centralize control of users, apps and devices.