What is eToken Enterprise? - tlk
What is eToken Enterprise? - tlk
What is eToken Enterprise? - tlk
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
High security: Using a hardware key provides a much higher<br />
degree of security than software-only solutions. Security credentials<br />
are not at r<strong>is</strong>k because they are held in a secure, tamper-evident<br />
container. <strong>eToken</strong> technology <strong>is</strong> completely res<strong>is</strong>tant to cracking,<br />
even with full knowledge of the encryption algorithms and protocols<br />
used. The <strong>eToken</strong> PRO provides full hardware-based protection for<br />
essential security information, with on-chip key generation.<br />
Cost-effectiveness: <strong>eToken</strong> <strong>is</strong> more cost-effective than any other<br />
hardware security system. While providing all the benefits of smart<br />
card technology, <strong>eToken</strong> requires no costly smart card readers.<br />
Compatibility and ease of integration: <strong>eToken</strong> can be used with<br />
various environments, USB-compatible devices and operating<br />
systems, including Windows 98, NT 4.0, ME and 2000, and supports<br />
the major cryptographic API standards, such as Microsoft CAPI and<br />
PKCS #11, allowing for seamless integration with applications.<br />
Convenience and portability: Easy to carry on a personal key<br />
ring, <strong>eToken</strong> <strong>is</strong> portable from one computer or site to another.<br />
Ease of use: No additional hardware <strong>is</strong> required. To obtain true<br />
two-factor authentication, users simply insert their personalized<br />
<strong>eToken</strong> into the USB port on a hub, desktop, laptop, keyboard or<br />
monitor, and enter their unique password or passphrase.<br />
Ease of admin<strong>is</strong>tration: <strong>eToken</strong> Enterpr<strong>is</strong>e provides easy-to-use<br />
security client solutions for admin<strong>is</strong>trators, simplifying the process<br />
of initial deployment and ongoing user and certificate management.<br />
Versatility: A single <strong>eToken</strong> can be used with different types of<br />
applications concurrently, and can contain multiple private keys<br />
and digital certificates. <strong>eToken</strong> <strong>is</strong> available in a range of memory<br />
sizes and colors.<br />
4 Introduction