|
SecuriKey Protect Computers against unauthorised use |
|
|
|
| SecuriKey's attractive USB token attaches to any key ring and easily plugs into a computer's USB (Universal Serial Bus) port or USB hub. By combining physical (USB key) and informational (password) requirements, SecuriKey offers exceptional 2-factor security protection, without the expense and time-intensive rollout required with PKI systems. |
|
| SecuriKey's 2-factor system assures that the person using a particular workstation is authorized for its use. The solution is cost-effective because it doesn't require a special hardware device to authenticate the physical token other than an available USB port; encryption inside the key itself guarantees that only the person with the right password and the right SecuriKey key can log in. |
|
| By locking corporate workstations-the "front door" of any enterprise-SecuriKey offers flexible, reliable protection against corporate data compromise and/or unauthorized software use. |
|
| SecuriKey is designed to be simple to deploy and simple to use, without the need for full time security experts on staff to manage the infrastructure. In fact, SecuriKey doesn't require any complex and expensive PKI systems in order to operate. SecuriKey also offers additional features such as protection of laptops, even when they are not on the network, and automatic workstation locking when the user removes his SecuriKey token. |
|
| With SecuriKey, the normal Windows login facility is replaced by a SecuriKey-based login that requires the user to plug in personalized SecuriKey key into the USB port in addition to entering her password. |
|
| If the user doesn't have the correct password plus the correct SecuriKey key, the system will not allow her to log in. When the user needs to step away from her desk, she simply unplugs her SecuriKey key and the workstation automatically locks until the user logs back in. It's that simple. |
|
| User compliance is much higher with SecuriKey. Because the SecuriKey token gets attached to the user's key ring, it won't get left in place like smart cards in a smart card reader (and therefore short circuit the security system). Users think of their key ring as containing their very important personal keys, such as their car key, house key, office key, and computer key. Everyone keeps close track of his personal key ring. |
|
 |
|