OLMEK Mach 2006 Olmek is an innovative solution developed by Item Centric to protect digital data’s storage and exchange with an unprecedented level of.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Ljubomir Ivaniš CPU d.o.o.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
System Software Chapter 5 McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
System Software Chapter Describe the differences between system software and application software Discuss the four types of system software Discuss.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 System Software.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
SP2 Mikael Nystrom. Agenda Översikt Installation.
1 ANTI VIRUS UPDATING. 2 Anti Virus Software: There are as many hackers today as there are software developers. Cyber crime has been recognized as needing.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Real Security InterSwyft Technical information's.
Test Review. What is the main advantage to using shadow copies?
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Virtual Company Group 8 Presentation Date: June /04/2017
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Chapter 9: Novell NetWare
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Introducing Office 365 for Enterprises Andy O’Donald Technical Product Manager Redmond OSP212 Ben Walters Technical Solution Specialist Melbourne.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 System Software.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Networks.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ALICE Use of CMF (CC) for the installation of OS and basic S/W OPC servers and other special S/W installed and configured by hand PVSS project provided.
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Comprehensive Project Management Solutions with the.NET Server family.
Enterprise Messaging & Collaboration. e-Interact Modules.
BMTS 242: Computer and Systems Lecture 5: Yousef Alharbi Website
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Technology Requirements for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
“Business first, technology's the tool.”. The Application Hosting business model is based on a very simple idea:  Install application software on powerful.
Microsoft Installing & Configuring Windows Server Exam Questions Answers Powered By:
Step-by-Step Guide to Asynchronous Data (File) Replication (File Based) over a WAN Supported by Open-E ® DSS™ Software Version: DSS ver up85 Presentation.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
PDF Recovery Tool Fix Portable Document File Format.
HP Indigo Sales & Marketing Suitcase Overview and setup
Cloud Storage Service with Proven Military Grade Security
BUILD SECURE PRODUCTS AND SERVICES
Working at a Small-to-Medium Business or ISP – Chapter 8
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
McGraw-Hill Technology Education
Getting Started.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Getting Started.
Information Technology Ms. Abeer Helwa
STATEL an easy way to transfer data
Microsoft Virtual Academy
Presentation transcript:

OLMEK Mach 2006 Olmek is an innovative solution developed by Item Centric to protect digital data’s storage and exchange with an unprecedented level of confidentiality and security, while seamlessly integrating into existing IT environments

2 Digital data is vulnerable to: Economic, financial and industrial spying Internal hacking Theft or loss of hardware (eg: notebooks) Copy of server contents, storage mediums Attacks, blackmail and money extortion Hardware failure

3 Olmek : the Nomadic Vault Desktop 3 main functionalities: Confidential data management Instant and secured sharing of file of any size and type Nomadic secured access from anywhere via the Internet

4 Olmek : Confidential Data Management Olmek’s specific file’s treatment Symetric key (from 128 to 256 bits) Asymmetric RSA key (from 1024 to 4096 bits) Total encryption (client and servers) All files are signed

5 Olmek : Instant and Secured Sharing of File Sharing by encrypted links Only the recipient can view the shared file No server (no more spamming or phishing) No size limit and any type of file No viral forwarding of encrypted links Automatic receipt of downloading

6 Olmek : Nomadic Secured Access from Anywhere via Internet Light non-intrusive software (.exe or DLL) All proxy management (basic, NTLM, SSO …) All networks (LAN, Wifi, GPRS, 3G …) No need to carry any file No foot print of viewed files

7 Olmek : full integration and original fonctions Olmek’s interface similar to Window’s Explorer Windows (98 to XP SP2) and Pocket PC Automatic file versioning File’s comments Easy non automatic file’s sharing Real time notification for any shared file Any sharing can be cancelled

8 Olmek Complies with Companies’ Requirements - Instant configuration - Quick account - activation - No maintenance IT manager - Internal and external usage - Real time cost control - IT team can focus on its core mission - Olmek is Sarbannes-Oxley compliant Global procurement - Easy to use - No learning curve - Nomadic solution - Autonomous usage - Highly secured tool - Windows integration - Update via Internet User Simplicity Economy Speed Security - No new opening of TCP port - On line secured back up solution - Transparent use of the network System operator OLMEK

9 Olmek : Functioning Model OLMEK Original file Modified File : Internet C1C1 C2C2 C3C3 Authenticating Server Internal Network

10 Olmek : Adapted Customer’s Solutions 2 types of contrat: 1/ Subscription (based on uploaded volume) 2/ Buying of usage licence 2 technical configurations: A/ ASP Mode (servers managed by Item Centric) Download volume : unlimited and free Sharing volume : unlimited and free Disk space : unlimited B/ In House Mode (servers managed by customer)

11 Olmek : Current Developments Secured Push Olmek secured and decentralized Directory Olmek Messenger (confidential online chat) Olmek Offline (DRM) Olmek Linux version

12 Thank you for your attention Item Centric - Olmek The Olmec civilization (1500 BC AD) is the oldest one known in South America. This civilization is at the origin of many innovations: storage, underground hydraulic networks, task specialization, the first writing and counting by means of dots and bars. It also left behind colossal stone sculptures.