Authenex(R) (a provider of cost-effective authentication and encryption solutions) and ASIERUS, Inc.(TM) (a specialist in outsourced network management and information technology support services) have announced that the ASAS(R) System is an exclusive part of EVERYTHING AnyWare(TM), a new patent pending suite of products and services that promises to increase business agility and continuity while reducing overall IT cost.
The ASAS(R) System is the most advanced, cost-effective and easy to administer network security system available. It enables organizations of all sizes to authenticate network and Web users, secure Web log in and ensure that data taken on the road is safe from loss or theft.
EVERYTHING AnyWare(TM) is a complete office virtualization system that remotely provides all aspects of a businesss IT needs. This enables organizations to consolidate and maximize the use of IT, while dramatically reducing IT investment.
"The ASAS(R) System is a perfect fit for EVERYTHING AnyWare(TM), because it provides the highest level of security, while ensuring that access to our customers critical information is simple and easy to use," said Jeff Goodey, Chief Technology Officer of ASIERUS, Inc.
The EVERYTHING AnyWare /ASAS(R) system improves productivity by enabling anyone to access their data and applications and do their work anywhere at any time. And it ensures that customer data is safe by taking full advantage of the complete ASAS(R) system: A user plugs his A-Key(R) token into the USB port of any computer with an internet connection and enters his PIN. The A-Key(R) tokens auto launch feature automatically launches a Web browser, which takes him to the ASIERUS, Inc.(TM) Web Portal. A secure tunnel is authenticated by a client-side certificate that ACert(TM) software (residing securely on the A-Key(R) token) issues and is then encrypted by the VPN end point certificate. The token guarantees the identity of the user by generating a unique One Time Password (OTP) six-digit authentication number and automatically appends it to his PIN, then logs the user onto the network. The user can then access his companys virtual office and download his data onto the secure flash memory on his token and take it anywhere, knowing that his data is totally secure from loss and theft. For more information, please send your e-mails to swm@infothe.com. ¨Ï2007 www.SecurityWorldMag.com. All rights reserved.
|