|
Companies face a variety of critical technology challenges - software, network connectivity, data encryption and others - as they conduct business in an increasingly insecure world. Ceelox solutions provide a wide range of industries with practical, easy to use tools that address specific security issues.
Virtually every aspect of enterprise and personal computing depends on securing access and protecting sensitive or critical information. Old security methods are being rebuilt, replaced, and enhanced to reflect new and more exacting security standards, a trend driven by a rise in cybercrime, identity theft, and computer fraud.
|
|
|
Solutions |
Ceelox’s biometric security software solutions provide secure, logical access to computers, networks and data. Ceelox’s solutions for biometric access can function as a password replacement tool or as a two-factor (biometric and password access) authentication system that meets FFIEC regulations.
Solutions include:
- Ceelox ID® – Designed for biometric user identification and authentication when accessing computer devices, networks, files or Web sites.
- Ceelox ID Online™ – A server-based biometric software application designed to protect access to Web-accessible information or applications by adding biometric identification and authentication to the Website log-in function.
Ceelox also develops encryption software tools that protect user data stored on PC’s or servers and when transmitting via email or instant message (IM). Ceelox’s encryption software solutions include:
- Ceelox Vault™ – An end-point drag and drop file encryption solution for protecting data stored on local machines or on portable storage devices. Ceelox Vault™ is unique in that the application itself resides on the portable storage device and can encrypt or decrypt on any host PC.
- Ceelox SecureMail™ – A powerful, easy-to-use software application that enables enterprise users to encrypt/decrypt electronic mail over the network or Internet. SecureMail provides users a means to email or IM sensitive information that only the intended recipient may access. SecureMail also supports a form of encryption known as steganography (steg) that allows information to be stored inside of images or pictures. This unique ability offers companies who use SecureMail the option to embed sensitive information sent to customers and business partners in a marketing image promoting the sender’s products or services.
|
|