ACCESS Enterprise |
Written by Ct R. Hamith | |
Thursday, 27 January 2011 07:02 | |
ACCESS Enterprise (AE) is a management system for portable security devices.Supporting the full range of Stealth Key and Stealth HD devices offered by MXI, AE is the ideal solution for controlling secure USB devices, whether they’re used for secure portable storage, Stealth Zone Secure USB Desktops, or digital identity applications. MXI products and solutions integrate into your IT infrastructure in the smoothest possible way. ACCESS Enterprise gives administrators the ability to issue and manage any portable security device on the network.
ACCESS Enterprise Server With the optional ACCESS Enterprise Server, deployment becomes highly scalable, allowing users to self-issue devices right at their desks while maintaining full adherence to predefined security policies. These policies can be updated at any time, even over the Internet. An industry first, the AE Server uses direct device communication through a NIST SP800-56A certified, authenticated secure channel. Unlike lesser server solutions, client software on the host does not translate server policies and then apply them to devices – the server directly applies policies to devices for true security and policy immunity to host-resident malware. AE Server’s user self-rescue feature ensures that devices remain accessible, even if a user forgets their password or damages their fingerprint. Conversely, device revocation allows compromised devices to be blocked or even have their data erased remotely, preventing data leakage. What’s new in ACCESS Enterprise Version 4.0 ?
ACCESS Enterprise 4.0 Server Features
|
|
Last Updated ( Thursday, 27 January 2011 07:32 ) |
Identity theft is the top consumer complaint in the
Credit card fraud (25%) was the most common form of reported identity theft in the
More than 100 000 people are affected by identity theft each year in the
According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005
Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data