25 March 2016

HID Global, with its product brand OMNIKEY one of the world’s leading manufacturers of innovative smart card readers, offers with the OMNIKEY® 3121 a high-performance smart card reader USB connected for desktop use with multiple standing options in a robust housing. The OMNIKEY® 3121 is an easy-to-install USB card reader suited for all contact smart […]

Paylaş
16 October 2015

The world’s most deployed platform for Microsoft TMG 2010 Celestix is committed to continue servicing the market for Microsoft TMG 2010 until 2023, enabling businesses to continue deploying this market leading perimeter security platform.Celestix MSA™ security appliances deliver Microsoft’s Forefront Threat Management Gateway 2010 for unmatched multi-threat protection with industry-leading ease of use and value. […]

Paylaş
16 October 2015

Celestix is committed to continue servicing the market for Microsoft UAG 2010 until 2023, allowing existing customers to continue depending on the product with peace of mind. It also enables new customers to depend on UAG without any concern about the lifecycle of the product.Organizations of all sizes rely on UAG 2010 to deliver comprehensive, […]

Paylaş
16 October 2015

Celestix HOTPin is a tokenless two-factor authentication solution that enables organizations to empower their mobile workforce while ensuring industry leading protection of digital identities and protecting against unsolicited access to corporate resources, a primary reason for the loss of data. Celestix HOTPin enables organizations not only to mobilize their workforce but allows them also to […]

Paylaş
16 October 2015

An on-premises solution for increased security, rapid deployment, and enriched SSO experience for Office 365 and SaaS applications CelestixFederated is a plug-and-play solution that provides seamless Active Directory (AD) integration with Office 365 and other applications located either behind the firewall or in the cloud to enable single sign-on and access management. Purpose-built solution to […]

Paylaş
16 October 2015

Yapım Aşamasında

Paylaş
28 August 2015

Cyber Security, SOME (CIRT – Cyber ​​Incident Response Teams) solution Access Control, Authentication and Certificate Management Network Analysis Systems Log Management and Correlation Threat Management Integrated Security Management Systems Information Security Consultancy Secure access for computer and application software with card, PIN and biometric elements (Login and access to the computer other than the owner […]

Paylaş