www.secure-it.com.my

MXI Products
ACCESS Enterprise
Thursday, 27 January 2011 07:02
ACCESS Identity

ACCESS Enterprise (AE) is a management system for portable security devices.Supporting the full range of Stealth Key and Stealth HD devices offered by MXI, AE is the ideal solution for controlling secure USB devices, whether they’re used for secure portable storage, Stealth Zone Secure USB Desktops, or digital identity applications.

MXI products and solutions integrate into your IT infrastructure in the smoothest possible way.  ACCESS Enterprise gives administrators the ability to issue and manage any portable security device on the network.

Enterprise Table

  • Streamlined Workflows - ACCESS Enterprise reduces overhead for administrators while still providing an intuitive and productive experience for users.
  • Tailored to Each User - Administrators can tailor security policies and portable security device behavior to different user needs. Policies for authentication ― such as password complexity rules, biometric security levels and retry limits ― can be adjusted to the needs of each group of users.
  • Advanced Reporting - ACCESS Enterprise gives the option of logging and storing a complete history of administrative activities, security policies and respective state of each individual device. Thus administrators will be able to more accurately log audit and compliance information.
  • Identity Provisioning - Allows to easily place certificates, keys, and/or RSA SecurID soft tokens on user devices.

ACCESS Enterprise Server

With the optional ACCESS Enterprise Server, deployment becomes highly scalable, allowing users to self-issue devices right at their desks while maintaining full adherence to predefined security policies. These policies can be updated at any time, even over the Internet.

An industry first, the AE Server uses direct device communication through a NIST SP800-56A certified, authenticated secure channel. Unlike lesser server solutions, client software on the host does not translate server policies and then apply them to devices – the server directly applies policies to devices for true security and policy immunity to host-resident malware.

AE Server’s user self-rescue feature ensures that devices remain accessible, even if a user forgets their password or damages their fingerprint. Conversely, device revocation allows compromised devices to be blocked or even have their data erased remotely, preventing data leakage.

What’s new in ACCESS Enterprise Version 4.0 ?

  • Portable Content Manager (PCM) - The PCM allows IT administrators to simply drag and drop corporate applications that can be pre-loaded onto employee portable devices.  These applications can include single sign-on for web forms, portable secured Internet browsers, remote access for clients and virtual desktops.
  • Integrated Reporting - Pre-configured reports now provide auditing data and information regarding devices, users and deployment statuses, for increased security.
  • Improved Data Recovery - Help desk operators can now re-establish access to the device or even permanently erase all of the device’s data when users fail to authenticate their USB device. Easy to implement password and biometric recovery options are available to rescue blocked users, even if they are away from the corporate network.

ACCESS Enterprise 4.0 Server Features

  • User Self-Issuance - Users issue their own devices at their desktop, according to your predefined security policies in Active Directory.
  • Remote Policy Update - Devices can receive policy updates anywhere on the Internet.
  • Remote Device Kill - Revoke any user device, with optional data destruction, anywhere on the Internet.
  • User Self-Rescue - Users can recover from a forgotten password without a help desk call
  • On-Premises Security - All aspects of the solution operate from your network – no need to pay for, or risk trusting, a third-party service.
  • Portable Application Deployment - Securely configure your own device images, with your own applications and files.
  • Identity Provisioning* - Easily place certificates, keys, and/or RSA SecurID soft tokens on user devices. *Requires ACCESS Identity 4.0 or higher.

Last Updated ( Thursday, 27 January 2011 07:32 )
 


Page 10 of 13

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


mxi-3devices0

Visitors

mod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_counter
Now: 2024-04-29 11:12

Who's Online

We have 373 guests online
You are here  :