Product/Service

CKM Software

Source: TECSEC, Inc.
Many networks store sensitive data in plain language and users of electronic mail often do not give a second thought to confidentiality
Many networks store sensitive data in plain language and users of electronic mail often do not give a second thought to confidentiality. The confidentiality of e-mail can be compared to that of a postcard in that both may be exposed to third parties. Although there is no such thing as absolute security in the computer world, encryption is the most powerful form of information protection available. With the growth of networked communications, there is a vastly increased exposure to eavesdropping. "Confidentiality" requires encryption if true security is to be achieved. "Privacy" of stored data requires at least equal protection. To reach its potential, eCommerce must have flexible and transparent encryption available. CKM and PKI work well together. TECSEC integrates PKI into its CKM products.

CKM Software, designed for the network centric world, provides: For Network Owners:

Vast scaleability to accommodate growing networks of users
Client based system - no severe single point of failure
Multiple, dynamically configurable VPNs
Fine grained, role based access control
Object management control system
Confidentiality of information content
Cost efficiency - both introductory and maintenance costs are well below the trade publication reports on what other vendors charge.
Administratively very efficient with low maintenance
Enforces privacy policies
Exportable: Currently shipping with a 392 bit symmetrical algorithm

Individual network users are provided with:
Ease of use (both for data-in-transit and data-at-rest)
Transparency - one click is all that is needed
Lightening fast processing - no perceptible delay

TECSEC, Inc., 1953 Gallows Road, Vienna, VA 22182. Tel: 703-506-9069; Fax: 703-506-1484.