Applications have to be delivered securely. Like everything else, there are no application security short cuts. Our centralized, virtualized and cloud-based architecture gives you the most secure infrastructure available.
We go a step
or data theft.
With our hosted application delivery, data is kept in your chosen Data Center, while only screen updates, mouse clicks, and keystrokes travel the network.
As for those things that do traverse the Internet, we go a step further to eliminate any chance of loss or data theft. Perhaps a few steps further. For your protection we provide centralized password control, multi-factor authentication, encrypted delivery, and a hardened SSL VPN appliance.
From one end of the network to the other, high performance, standards-based encryption security is incorporated for all data from the Data Center. This applies to users everywhere.
Scenario-based access control
Here, intelligent endpoint analysis determines what type of desktop and access to applications a user receives at each logon, based on location, device, and user profile.
Words we all
Our systems allow you to add yet another extra factor for user authentication. When a user initiates a remote login, they must first enter their company name, user name, and password. Then, our systems send a text message to their cell phone. It contains a uniquely generated second password that the user must enter within a prescribed amount of time to gain access to the system.
Session recording and playback
Upon request, our Smart Auditor can record and play back user sessions to identify and document fraud, and to defend against any possible litigation.