copyright CryptoTec AG Communication in stealth mode
copyright CryptoTec AG About us iDev Gmbh IT security expert ISTQB certification in the area of quality management Business environment is the sports betting industry with billions of turnover CryptoTec AG Goal: high security encrypted data management Technology & usability united Cryptographic systems copyright CryptoTec AG
3 Internet threat copyright CryptoTec AG
4 Internet threat
copyright CryptoTec AG Internet threat copyright CryptoTec AG 2015
66 Internet threat copyright CryptoTec AG 2015
7 Cybercrime New dimension of threat copyright CryptoTec AG
8 Cybercrime Attacks from the inside and via social engineering Huge data storage devices Industrial espionage Centralized servers VPN Webbrowser Invitation by (containing links) Hacker copyright CryptoTec AG New dimension of threat
copyright CryptoTec AG CryptoTec Zone Encrypted communication & highly secure file transfers Intuitive – straightforward – timesaving copyright CryptoTec AG
10 Preventive – CryptoTec Zone CryptoLib ensures end-to-end encryption CryptoStorage garantees that all data will only be transferred & stored encrypted Usability & maximum performance (faster than VPN) Automated cryptography CryptoTec Zone only allows authorized CryptoIDs Closed User Group (CUG) Monitoring 2.0 Workflow unimpaired: - Delta Coding optimized - Standard applications (MS Office) useable copyright CryptoTec AG
copyright CryptoTec AG copyright CryptoTec AG
copyright CryptoTec AG % protection against unauthorized access by: Administrators and staff Softwaredevelopers and providers Service providers (Mail, Cloud, Mobile, Internet, WLAN) TC & IT providers Organzied crime Hackers Intelligence services and foreign authorities Highsecurity solution Access protection copyright CryptoTec AG
copyright CryptoTec AG Become an IT security expert Integration into Workflow Customizing Modular extensions (Change according to development) Human and M2M communication Redundant and fully encrypted high security servers Operation of the Trust Center copyright CryptoTec AG
copyright CryptoTec AG Exponential growth of the IT security budget copyright CryptoTec AG
copyright CryptoTec AG Academic Alliance Free software version Intellectual property must be protected Friedrich-Alexander-University Erlangen-Nuremberg RWTH Aachen University UZH Zurich copyright CryptoTec AG
copyright CryptoTec AG Thank you for your attention CryptoTec AG Spichernstr Köln T: F:
copyright CryptoTec AG Any questions ?