Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION. Copyrightc AHRANTA All Rights Reserved.

Size: px
Start display at page:

Download "Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION. Copyrightc 1991-2014 AHRANTA All Rights Reserved."

Transcription

1 Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION

2 CONTENTS Overview History Major Business 1) Business Area 2) Main Product 3) Customers 04 Patents and Awards 1) Patents 2) Awards 2

3 Ⅰ OVERVIEW Ahranta has a network-based technology that has been accumulated for 23 years. With this technology which will secure assets and information of corporations and individual from various security threats, we developed and released security solution to the market. Now we are expanding our business by supplying public offices and companies with our products. We have been meeting the needs of our clients and providing better service with changes of the times and we are hoping to jump up to be a leading company in the world's security solution market based on our leading-edge technology and expertise. Company Name Country CEO Year of Establishment Business Category Ahranta. Inc. South Korea Sangkwon Youn 1991 Security Solution, Remote Control Service, Software Development and Supply Business Area Solution Sales Cloud Service Package Sales OEM SI Development Business Contents Remote control and security solution sales & supply Remote control Cloud rental Service Security program sales & supply International sales (Cloud OEM supply) SI development support based on its own technology 3

4 Ⅱ HISTORY Twin-Net 2000 released. [Windows 95/98/NT 4.0] Selected for industrial based technology developer (Ministry of Industry and Resources) PointLock Pro, Sales cooperation contract with ASK, Japan Selected as Recommend Program by McAfee, US Developed Remote Control ASP service Internet AS Doctor Developed PC security program PointLock Internet A/S Baksa 5.0 releases Personal Remote Control Service GOMYPC 2.0 released and developed Japanese ver. Internet Desktop Helper 2.0 release Desktop Helper 2007 release Desktop Helper PRO release GOMYPC sales contract with Japan AS BAKSA Android Remote Control Service open GOMYPC Android Remote Control Service open Pointlock M,M Plus developed Nlock release Mobile Helper release 1991~ ~ ~ ~ ~ : PointLockPRO, : DesktopHelper : Innobiz : Established Venture Company Patent on Security method certification for Computer file and folder 5.0, GS(Good Software) Certification R&D Center :Grand Prize for Certification : Pointlock Pro :Selected Grand Prize for New GS Certification and Venture Companies : Selected Export Export oriented Software registered in Public (Minister of Industry and oriented company company (SMBA) Procurement Service Resources) 4

5 Ⅱ HISTORY 2011 ~ : Launched Integrated mobile security solution WizHelper : Established R&D Center : Pointlock Pro, GS Certification and registered in Public Procurement Service : AS Doctor Opened Android mobile remote control service : GOMYPC Opened Android mobile remote control service : PointLock M / M Plus Development : Provided Nlock to Korea National Oil Corporation : Windows 7 Compatibility Certification : Provided DesktopHelper PRO tokorea Internet & Security Agency : Provided DesktopHelper LIVE to Overseas Koreans Foundation : Provided PointLock Pro to Department of Defense : Provided Desktop Helper to Incheon City hall : Provided Desktop Helper to Ministry of Health, Welfare and Family Affairs : Provided Desktop Helper to Internal Revenue Service Home Tex / EITC 2006~ : Provided Remote control solutions for the next generation of information systems to build business to MMA : SMEs Business Export Assistance Center, Selected as a Promising Export Firm : GOMYPC Japan export contracts : GOMYPC, Export contract with Japan : DesktopHelper 5.0, obtained GS(Good Software) certification : Obtained InnoBiz certification ~ : Provided Electronic Document Management System to 2000~ : Developed PC Security Program PointLock : Grand prize for Venture Company from Minister of Industry and Resources Korea Polytechnic University : Developed Remote Control ASP Service Internet AS Doctor : PointLock PRO, Contract with McAfee Inc. about Sales cooperation and Co-promotion agreement : Obtained patent on Security method of computer file and folder : PointLock PRO, Sales cooperation contract with ASK, Japan 1991~ : Established Ahranta, Inc : Developed Remote Control program AS Doctor 1.0(DOS ver.) : Developed AS Doctor Windows ver : Grand Prize of New Software from the Ministry of Information and Communication(MIC) 5

6 Ⅲ MAJOR BUSINESS 1) Business Area Ahranta provides the best remote control solution as the first developer of remote control program and various security solutions to manage mobile, PC, laptop, server safely. Security Solutions Security program for PC : PointLock PRO Management solution for laptop : nlock Server Encrypting solution : PointLock S Security program for Smart device, MDM(BYOD) - Point Lock M, Point Lock M Plus Remote control solutions (Solution / ASP Services) Integrated mobile security solution : WizHelper Enterprise Remote Control - AS Doctor, Desktop Helper PRO Personal Remote Control : GOMYPC 6

7 Ⅲ MAJOR BUSINESS 2) Main Product PointLock PRO PointLock PRO is a PC security program that has features such as One-click Folder lock and File encryption. This program protects your PC from Hacking and information leakage that happen inside and outside. Feature Version Free Works with every version of your OS, MS Office (No Hooking) Window Explorer Interface, Easy-to-use program (One-click Folder lock) Offers various and essential security feature (File encryption, Folder lock, Network Lock) Encrypted file can be freely corrected and automatically be saved Automatic Encrypted in PointLock Pro Explorer. Don t need Server to operate this program (Light operating environment and Reasonable price) 7

8 Ⅲ MAJOR BUSINESS 2) Main Product WiZHelper With over 1 billion of smart phone users, customer service related to mobile device has extremely increased. WiZHelper is a remote support service for the android mobile device and PC without a risk of personal information leakage. Corporation, financial institution, public offices which need a mobile remote control service can provide the best remote support service to their customers with WiZHelper. Feature Provide tight security for the remote support and personal information Manage customer service agents and support records easily with administrator page Support every network environment and every android device Switch between 3G, LTE, LTE-A and Wi-Fi without disconnection. One agent can deal with a maximum of 6 customers simultaneously. 8

9 Ⅳ MAJOR BUSINESS 3) Customers Public offices Educational institutions General corporation 9

10 Ⅳ PATENTS AND AWARDS 1) Patents Security Method for Remote Control (Application Number : ) Method for Real Time Remote Control (Patent ) Security method for computer files (Patent )) - Real Time Screen Control Technology - Tunneling Technology - Hooking Technology - Protocol Filtering Technology - Internet User Authentication Technology - LAN Protocol Management Technology - File Encryption and Decryption Technology 10

11 Ⅳ PATENTS AND AWARDS 2) Awards Selected for 'Information and Communication Promoting Fund (Communications ministry) Selected for 'New Technology Development Fund' (Small and Medium Business Administration) Grand Prize for New Software (Communication Industry Federation of Korea) Selected for industrial based technology developer (Ministry of Industry and Resources) Won Customer Satisfaction Awards (The Daily Information Times) Participated in Comdex Fall, Las Vegas Grand Prize for Venture Companies (Minister of Industry and Resources) Participated in Technological Innovation Expo, Seoul Participated in ASEAN Communication & Multimedia Expo, Kuala Lumpur, Malaysia Participated in Comdex Fall, Las Vegas Selected Export oriented company Top ASP Service Company (the Ministry of Information and Communication) Good Software Certification (Telecommunications Technology Association of Korea) 2007 Selected Export oriented company (Small and Medium Business Administration) Innobiz Certification 2009 Selected as top company of Korean new growth engine 2011 Pointlock Pro GS(Good Software) Certification (Telecommunications Technology Association of Korea) 2013 Established R&D Center 11

12 Thank you. Ahranta Inc. 2F Seokyo-world Building,(Seokyo-dong) 88 Worldcup-Ro, Mapo-gu, Seoul, Korea Phone : Fax : Mail : kyungring@ahranta.com Website: Copyrightc AHRANTA All Rights Reserved. 12

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr Since 1992, Total Solution Provider Company Introduction Samjung Data Service co., Ltd. http://www.sds.co.kr Index 1. Overview 2. History 3. Organization 4. Business Area 5. Service Introduction 6. Acquiring

More information

Parla, Secure Cloud Email

Parla, Secure Cloud Email Parla, Secure Cloud Email Secure Email, Instant Messaging, Calendar, Contacts, Tasks, File sharing and Notes across all devices The 1 st Secure Email and Instant Messaging from and European Security Vendor

More information

Securing the Exchange of Information Inside and Outside the Organisation. Joe Combs EMEA Solution Consultant, edocs

Securing the Exchange of Information Inside and Outside the Organisation. Joe Combs EMEA Solution Consultant, edocs Securing the Exchange of Information Inside and Outside the Organisation Joe Combs EMEA Solution Consultant, edocs OpenText Confidential. 2015 All Rights Reserved. 3 OpenText Confidential. 2015 All Rights

More information

Desktop Virtualization and Cloud Computing Systems Security Audit Committee Item 5 July 14, 2011 Shaun Coyne

Desktop Virtualization and Cloud Computing Systems Security Audit Committee Item 5 July 14, 2011 Shaun Coyne Desktop Virtualization and Cloud Computing Systems Security Audit Committee Item 5 July 14, 2011 Shaun Coyne 1 9 Components How It Works 2 VDI COMPONENTS Thin-Client, Browser Based, Smart Device Access

More information

Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices

Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices - Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices Parla Spamina Parla is a cloud-based Email platform with up to 30Gb of mailbox space providing enterprise-class email, calendar,

More information

Mobile System Technologies Certification Program

Mobile System Technologies Certification Program Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

A Call for Drastic Action. A Survey of Web Application Firewalls

A Call for Drastic Action. A Survey of Web Application Firewalls A Call for Drastic Action A Survey of Web Application Firewalls About Me Jaeson Yoo, Head of Global Business Responsible for Penta s international business interests, for all regions/countries outside

More information

How To Protect Information Security In Japanese Government Computers

How To Protect Information Security In Japanese Government Computers Study on the Current Situation of Information Security in Cambodia Hitoshi ARAKI JICA Expert Needs of Information Security Use of the Internet is essential and indispensable for any business nowadays;

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

6. Gross Domestic Product by Country

6. Gross Domestic Product by Country 6. Gross Domestic Product by Country The economies of the six countries studied for this report have flourished, allowing for the very high growth rates in research and development (R&D) investment and

More information

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution. Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market

More information

A Study on Information Technology Plan and Status of University 2013

A Study on Information Technology Plan and Status of University 2013 , pp. 47-54 http://dx.doi.org/10.14257/ijseia.2014.8.10.05 A Study on Information Technology Plan and Status of University 2013 Tae-Yong Shim 1, Il-Jun Choi 2, Jin Kim 3 and Young-Hun Lee 4 1 Department

More information

INTERNET - NETWORK / TELEPHONE SERVICE CONTRACT

INTERNET - NETWORK / TELEPHONE SERVICE CONTRACT INTERNET - NETWORK / TELEPHONE SERVICE CONTRACT Exhibitor Company Name: Booth / Room #: Show Name: Billing Company Name: Billing Company Address: City, State / Country, Zip: Contact: Email: Show s: / /

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Investment Opportunities in the Digital Content Industry in Taiwan

Investment Opportunities in the Digital Content Industry in Taiwan Investment Opportunities in the Digital Content Industry in Taiwan I. Industry Definition and Scope Taiwan's digital content industry includes eight sub-categories, of which five are core industries while

More information

Supercomputing for Everyone. Egis L4 Switch. PDF created with pdffactory Pro trial version www.pdffactory.com

Supercomputing for Everyone. Egis L4 Switch. PDF created with pdffactory Pro trial version www.pdffactory.com Supercomputing for Everyone Egis L4 Switch Contents 1 Company 2 Egis L4 Switch 3 CLUNIX Egis L4 Switch 4 Reference Sites 1. Company Present Status General Information Main Businesses and Markets Core Capability

More information

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080 Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Safety and Health Grant Program Database Remote Access Installation Guide

Safety and Health Grant Program Database Remote Access Installation Guide Safety and Health Grant Program Database Remote Access Installation Guide Version 1.01 October 29, 2011 Imagine Nation Software 8223 Yukon Hills Ct. Las Vegas, NV 89178 www.insoftware.net Contact: Michael

More information

Cloudifile: Frequently Asked Questions

Cloudifile: Frequently Asked Questions Cloudifile: Frequently Asked Questions 1 Contents Cloudifile Compatibility... 3 Cloudifile Installation... 4 Cloudifile Account Registration... 5 Working with Cloudifile... 6 Cloudifile Functionality...

More information

Rethink Remote Access

Rethink Remote Access Rethink Remote Access Next Generation Network Access Technology Next Generation Remote Access Technology Today s remote access technology landscape is a patchwork of point solutions of mixed hardware and

More information

WS_FTP: The smarter way to transfer files

WS_FTP: The smarter way to transfer files WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable

More information

Allworx. Family of Products. Award-winning phone systems for businesses

Allworx. Family of Products. Award-winning phone systems for businesses Allworx Family of Products 2011 Award-winning phone systems for businesses Whether your business has 10 employees at a single site or hundreds of employees at multiple sites, traditional phones lines,

More information

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign

More information

Top Cloud Solutions For SMBs

Top Cloud Solutions For SMBs The Fulcrum Group, Inc. (817) 337-0300 Top Cloud Solutions For SMBs Is it time you came to the cloud? This White Paper is brought to you by your friends at The Fulcrum Group, Inc. Good timing plus a little

More information

Bring Your Own Device:

Bring Your Own Device: Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Samsung Mobile EMR. Streamlines medical information and connects medical staff with patients

Samsung Mobile EMR. Streamlines medical information and connects medical staff with patients Samsung Mobile EMR Streamlines medical information and connects medical staff with patients Highlights Increase productivity by providing a single place for medical staff to review and enter patient information,

More information

The most complete Classroom Management Software

The most complete Classroom Management Software The most complete Classroom Management Software Interactivity Collaboration Communicatio Control Multimedia Assesment Messages Broadcast Sharing Remote Monitoring www.snetclass.net Key Features Snetclass

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

customer Deliver Value reality COMPANY INTRODUCTION

customer Deliver Value reality COMPANY INTRODUCTION Voice Listen to of Deliver Value customer Vision Make a reality Headquarters : 4F, SHINMYUNG Bldg., 136, Yeoksam-ro, Gangnam-gu, Seoul, Korea Research Center : 9F, LINE Bldg., 16, Teheran-ro 14-gil, Gangnam-gu,

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Windows Phone User's Guide v15 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

The Risks and Rewards of Social Media and Mobile Devices

The Risks and Rewards of Social Media and Mobile Devices The Risks and Rewards of Social Media and Mobile Devices October 29-30, 2012 Tony Brooks, CISA Principal & Director of IT Assurance Tony and Brooks, Risk Services CISA, CRISC Partner HORNE - IT LLP Assurance

More information

Smart Telephone System

Smart Telephone System IG7600 Smart Telephone System Quick Installation Guide Copyright 2013, All Rights Reserved. Ver11140311 IG7600 Smart Telephone System Quick Installation Guide Powering up 1. Plug the IG7600 in and allow

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information

Connecting the Global Enterprise

Connecting the Global Enterprise Fujitsu Forum Munich 2013 Connecting the Global Enterprise Alan Davidson Director of Products, Services & Solutions, Fujitsu Telecommunications Europe 0 FUJITSU LIMITED 2013 The Network Services Market

More information

ShareLink 200 Setup Guide

ShareLink 200 Setup Guide ShareLink 00 Setup Guide This guide provides instructions for installing and connecting the Extron ShareLink 00. The ShareLink USB 00 Wireless Collaboration Gateway allows anyone to present content from

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Image Enabled EMR / EHR

Image Enabled EMR / EHR Image Enabled EMR / EHR A strategic approach to EMR integration and interoperability for diagnostic imaging and related reports The Challenge: In healthcare, imaging is routinely used as a tool for patient

More information

Security Solutions for HIPAA Compliance Issues 1

Security Solutions for HIPAA Compliance Issues 1 :6B)73 6HFXULW\6ROXWLRQVIRU +,3$$&RPSOLDQFH +RZ:6B)73&DQ+HOS +,3$$7KH+HDOWK,QVXUDQFH3RUWDELOLW\DQG $FFRXQWDELOLW\$FWRIZDVHQDFWHGWR HVWDEOLVKJXLGHOLQHVZLWKLQWKHKHDOWKFDUHLQGXVWU\ WRHQVXUHWKHSULYDF\RISDWLHQWVDQGWKHSK\VLFDO

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System.

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System. A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

KCC announces 'Comprehensive Plans for Smart Mobile Security'

KCC announces 'Comprehensive Plans for Smart Mobile Security' KCC announces 'Comprehensive Plans for Smart Mobile Security' - Promoting 10 key tasks in 3 fields to preemptively prepare for security threats and to develop Korea into a powerful nation of mobile security

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

SANGF OR S ANGF OR S SL VPN

SANGF OR S ANGF OR S SL VPN SSL VPN With the development of cloud computing and mobile devices, modern workforces have become increasingly mobilized and distributed. This trend requires business organizations to prepare its IT infrastructure

More information

2004 APEC Informatization Workshop for SMEs. Group Discussion 1

2004 APEC Informatization Workshop for SMEs. Group Discussion 1 2004 APEC Informatization Workshop for SMEs Group Discussion 1 October 21, 2004 Facilitator: Dr. Woobong Kim (Konkuk University, Seoul, Korea) Contents Topics to be discussed in this session The Conceptual

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Hitachi Systems Launches a Global Micro Data Center Model for Indoor Installation

Hitachi Systems Launches a Global Micro Data Center Model for Indoor Installation FOR IMMEDIATE RELEASE Contacts: Singapore: Kazuko Amamoto Japan: Osamu Sugiyama Hitachi Asia Ltd. Hitachi Systems, Ltd. +65-6212-1797 +81-3-5435-5002 ccg@has.hitachi.com.sg press.we@ml.hitachi-systems.com

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Nomad Vault: a 100% secure virtual private network accessible via thumb drive

Nomad Vault: a 100% secure virtual private network accessible via thumb drive Nomad Vault: a 100% secure virtual private network accessible via thumb drive Nomad Vault: securely save, share and transfer your data, anywhere you go How can you prevent losing everything when your laptop

More information

FDIC Division of Supervision and Consumer Protection

FDIC Division of Supervision and Consumer Protection FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers

More information

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led Prerequisites: Mobile Device Management Course 55078: 2 days Instructor Led Before attending this course, students must have: Basic understanding of TCP/IP and networking concepts. Basic Windows and Active

More information

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution April 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

Striking the Right Balance for

Striking the Right Balance for Striking the Right Balance for Laptop Data Protection ti Matthew Seeley EVault Systems Engineer 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Welcome Type in questions using the Ask A Question

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece VIDEOCONFERENCE 1 Introduction Videoconferencing is interactive remote communication between two or more participants, transmitted by voice or image. Participants see and listen to each other and can present

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Cloud Video. Data Sheet

Cloud Video. Data Sheet Cloud Video Data Sheet 4net Technologies Cloud Video 4net s Cloud Video enables remote workers to simply and easily connect to standards-based videoconferencing systems, VoIP phones, ipad s, iphone s and

More information

Mobile application testing for the enterprise

Mobile application testing for the enterprise Mobile application testing for the enterprise Accenture brings together deep knowledge of the enterprise, expertise in mobile technologies and strong end-to-end testing practices to help all enterprises

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Result of the Attitude Survey on Information Security

Result of the Attitude Survey on Information Security Presentation Result of the Attitude Survey on Information Security Conducted toward the companies Operating in Thailand February, 2009 Center of the International Cooperation for Computerization of Japan

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

BYOD & Virtualization: Managing Mobile

BYOD & Virtualization: Managing Mobile White Paper 01 Finches Only 02 ViewSonic Only BYOD & Virtualization: Managing Mobile Devices from the Desktop Erik Willey 04.15.2014 SUMMARY: Integrated with Citrix XenMobile, ViewSonic s SD-A245 smart

More information

Rethink Remote Access

Rethink Remote Access Rethink Remote Access Since 1986, the NCP engineering development team has continuously pushed to rethink how to allow enterprises to overcome the complexities of creating, managing and maintaining remote

More information

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution. DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable

More information

Secure Board. The software solution for BODs and Top Management. PROTECTED DATA AND DOCUMENTS Whenever. Wherever.

Secure Board. The software solution for BODs and Top Management. PROTECTED DATA AND DOCUMENTS Whenever. Wherever. The software solution for BODs and Top Management PROTECTED DATA AND DOCUMENTS Whenever. Wherever. The Solution for BODs and Top Management In case of acquisition and mergers, change management, business

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide DATA PROJECTOR EN XJ-A Series XJ-A147/XJ-A247/XJ-A257 XJ-M Series XJ-M146/XJ-M156 XJ-M246/XJ-M256 Network Function Guide In this manual, XJ-A Series and XJ-M Series refer only to the specific models listed

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since

More information

How are we keeping Hackers away from our UCD networks and computer systems?

How are we keeping Hackers away from our UCD networks and computer systems? How are we keeping Hackers away from our UCD networks and computer systems? Cybercrime Sony's Hacking Scandal Could Cost The Company $100 Million - http://www.businessinsider.com/sonys-hacking-scandal-could-cost-the-company-100-million-2014-12

More information

WINNERS OF APP DEVELOPER CHALLENGE 2012 REVEALED

WINNERS OF APP DEVELOPER CHALLENGE 2012 REVEALED NEWS RELEASE FOR IMMEDIATE RELEASE WINNERS OF APP DEVELOPER CHALLENGE 2012 REVEALED Celcom s collaborates with MDeC and MyAppzil to give local app developers a taste of global commercialisation through

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology What is Radmin? Radmin is a secure and reliable Windows-based remote control program, which allows you to work on several computers through a simple and familiar graphical interface. Radmin allows a user

More information

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents The #1 Remote Control and File Transfer Software Contents 1 Integration Summary 1 An Introduction to Timbuktu Pro 2 Integration Details 2 SMS Application Distribution Packs for Timbuktu Pro 3 SMS Console

More information

Freedom for Servers, Drives & Desktops

Freedom for Servers, Drives & Desktops a cloud commerce marketplace THE CLOUD REVOLUTION: Freedom for Servers, Drives & Desktops...cloud computing is enabling small and medium businesses (SMBs) to compete with the upper echelon of corporate

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Security Threats to Schools IT Systems & Long term solution

Security Threats to Schools IT Systems & Long term solution Security Threats to Schools IT Systems & Long term solution Mr. Albert Wong Chairman, Association of IT Leaders in Education (AiTLE) IT Coordinator & Computer Subject Panel, Lee Kau Yan Memorial School

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

NGIS in Korea. National Geographic Information System in Korea

NGIS in Korea. National Geographic Information System in Korea NGIS in Korea National Geographic Information System in Korea 1. Background of the NGIS Master Plan / 4 1) Circumstances 2) Background 2. Major Achievement of the First NGIS Master Plan / 6 3. The and

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Licensing Windows and Microsoft Office for use on a Mac

Licensing Windows and Microsoft Office for use on a Mac Volume Licensing brief Licensing Windows and Microsoft Office for use on a Mac Table of Contents This brief applies to all Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Details...

More information