Solutions
Partenaire
TED customers benefit from the breadth and depth of our their technical expertise and experience. Through the understanding of the specific issues they face, TED can design the products and services best suited to help them deliver their solutions.
Partenaire
Founded in 2001 and headquartered in Kusnacht, Switzerland, totemo provides email encryption, secure managed file transfer and secure mobile communication solutions for organisations and institutions under the umbrella of totemomail®, totemodata® and totemomobile®. totemo helps businesses to ensure that all communications with partners and customers remains confidential, reliable and efficient – and most importantly, device and location independent. totemo’s patented and FIPS 140-2-validated security platform enables seamless and quick integration into any existing IT infrastructure, guaranteeing total control over all transferred data even after sending.totemo’s email encryption solution totemomail® offers an interface to hardware security modules (HSMs) from Entrust which generate keys and perform key operations.Facts and Figures on totemomail® Encryption GatewaySolution Overview: totemomail® Encryption Gateway
Partenaire
Trustonic’s products are focused on three areas:Securing smart devices by embedding a Trusted Execution Environment (TEE) during the manufacturing stage of connected devices. Trustonic is a TEE market leader with their TEE already embedded into more than a billion devices. Working with leading partners in the device chain, our Trustonic Secured Platforms (TSP) solution help OEMs to deliver compelling, secure devices and secure services to multiple markets.Trustonic also inject a Root of Trust (RoT) into connected devices at the manufacturing stage to individually identify and classify devices enabling remote verification. This is particularly important in IoT and machine-to-machine communications where trust needs to be established between endpointsTrustonic’s TEE is also open, which means it can be leveraged by any third party applications and services through Trustonic’s Trustonic Application Protection (TAP) product. Through a combination of hardware TEE protection, underpinned by robust software protection elsewhere, TAP delivers the most secure application protection for any iOS- or Android-based device.Trustonic uses Entrust nShield HSM to safeguard and manage keys used in the device lifecycle. Each device can be monitored and tracked throughout it’s lifecycle, insuring IoT device and application security and preventing harmful processes.
Partenaire
UiPath has a vision to deliver the Fully Automated Enterprise™, one where companies use automation to unlock their greatest potential. UiPath offers an end-to-end platform for automation, combining the leading Robotic Process Automation (RPA) solution with a full suite of capabilities that enable every organization to rapidly scale digital business operations.
Partenaire
Verisec International is a tech company that helps banks, corporates and government secure their digital communication channels. We have a strong footprint in security for internet and mobile banks, ATM and payment networks. Through advanced cryptographic technology, expertise and many years of experience, we ensure that sensitive transactions, including access to money and personal data, are carried out by the right individual with the right access privileges, that there is non-repudiable evidence of who did what, and that sensitive data always remains inaccessible and unreadable for unauthorized persons.Our world uses words like crypto, strong authentication, biometrics, digital signatures and confidentiality; but for our customers, it is all about creating security and trust between merchants and consumers, authorities and citizens, banks and their customers as they transact digitally.
Partenaire
Verisec International is a tech company that helps banks, corporates and government secure their digital communication channels. We have a strong footprint in security for internet and mobile banks, ATM and payment networks.
Partenaire
ISC software, of which BIND and ISC DHCP are the two best‐known examples, is open source. ISC’s passion is Internet core technology. ISC’s widely‐imitated Managed Open Source process ensures software quality while keeping it completely open and available. ISC operates high‐reliability global networks of DNS root servers (F‐root) and authoritative DNS servers both for non‐profit and commercial enterprises.ISC is actively involved in Internet protocol and standards development, particularly in the areas of DNSSEC and IPv6. ISC is supported by donations from generous sponsors, by program membership fees, and by increasing revenues from for-profit subsidiaries.ISC and Entrust nShield HSMs work together to provide key protection and signing for DNSSEC.
Partenaire
Intexus SAS specializes in safeguarding the identity and data of individuals and organizations.
Partenaire
IQsec was founded in 2007 with a consultative professional approach, we specialize in cybersecurity, digital signature, and digital identity technologies and solutions based on the unique and particular needs of our clients, managing to build innovative and transformational projects. With a team of over 120 collaborators, we have nearly 70 subject matter experts with the highest certifications in the field of computer security, cryptography and digital identity.As a top leader and performance company, we have formal secure software development and research business units for the areas we specialize in, along with the capabilities for integration of security technologies into business processes based on IT. At the company level we have the certifications including FIRST, ISO27001, and CERT.
Search Results
Filter Options
Livre blanc
- Corporate Info (65)
- Télécharger (1845)
- Event (5)
- FAQ (3)
- Informatif (13)
- Base de connaissance (1311)
- Licensing and Agreement (4)
- Partenaire (433)
- PODCAST (28)
- COMMUNIQUÉ DE PRESSE (360)
- Product (211)
- RAPPORT (9)
- Ressources (135)
- Logiciels (6)
- Solutions (79)
- Assistance (41)
- CAS D’UTILISATION (2)
- Utility (6)
- Vidéo (234)
Product Categories
- Émission centralisée des cartes (119)
- Gestion de la posture de sécurité du cloud (26)
- Solutions pour cartes numériques (4)
- Signature électronique et numérique (58)
- Modules matériels de sécurité (HSM) (870)
- Identity and Access Management (IAM) (179)
- Émission instantanée de cartes bancaires (172)
- Émission instantanée de cartes d’identification (294)
- Sécurité Internet of Things (IoT) (21)
- Gestion des clés et chiffrement (83)
- Gestion des identités des machines (5)
- Fabrication et délivrance de passeports - Entrust FR (9)
- Post-quantique (7)
- Public Key Infrastructure (PKI) (155)
- Certificats Public Trust (7)
- Certificats TLS/SSL (118)