Download presentation
Presentation is loading. Please wait.
Published byRay Hartshorne Modified over 10 years ago
1
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments. It is a modular solution consisting of four general services which can be used separately or in combination.
2
ControlSphere uses smartcards/tokens as a secure portable storage for... Smartcard data is secured by PIN and is hack-proof
3
Single smartcard can hold one or more Windows user identities for one or multiple computers. Same device can be used for logon to local and domain PCs or servers. Remote access is fully supported. Single smartcard can hold one or more Windows user identities for one or multiple computers. Same device can be used for logon to local and domain PCs or servers. Remote access is fully supported. Smartcard + PIN replaces standard Windows authentication
4
ControlSphere SSO automatically detects, extends and, if necessary, automates all password requests across the system. Users can simply select existing password records to use or create new ones on the fly. They can setup automation rule with one mouse click and enjoy automatic authentication further. Users can simply select existing password records to use or create new ones on the fly. They can setup automation rule with one mouse click and enjoy automatic authentication further.
5
The solution replaces the need of knowing, remembering and typing any passwords! All WEB authentications Native Windows authentications (32/64 bits) Java programs SAP clients and anything else is freed from manual login Remote Desktop Microsoft Office Lotus Notes Internet Explorer Google Chrome Firefox Adobe Acrobat/Reader Skype
6
ControlSphere can encrypt sensitive data on a local hard drive, removable or network locations, allowing roaming access to company employees. It can fully secure user profile (Desktop, Favorites, usage history, etc.) and temporary data by automatically redirecting these folders to encrypted locations. No traces are left behind.
7
The Token Management System of ControlSphere is designed to help companies to control the lifecycle of their secure devices (smartcards/tokens) fleet. Data on users smartcards is automatically backed-up to the server. Updates are pushed by the server to the smartcards. Data on users smartcards is automatically backed-up to the server. Updates are pushed by the server to the smartcards. TMS Server runs on standard Microsoft IIS.
8
The Token Management System allows: Automatic smartcard data replication to a server. Update history is maintained. Automatic smartcard data replication to a server. Update history is maintained. Quick remote data restoration to another smartcard in a case of device loss or damage. Quick remote data restoration to another smartcard in a case of device loss or damage. Secure remote data updates from a server implicitly to users. Secure remote data updates from a server implicitly to users. Smartcard blacklisting in case of device loss. Smartcard blacklisting in case of device loss. Remote smartcard PIN reset. Remote smartcard PIN reset. The Token Management System allows: Automatic smartcard data replication to a server. Update history is maintained. Automatic smartcard data replication to a server. Update history is maintained. Quick remote data restoration to another smartcard in a case of device loss or damage. Quick remote data restoration to another smartcard in a case of device loss or damage. Secure remote data updates from a server implicitly to users. Secure remote data updates from a server implicitly to users. Smartcard blacklisting in case of device loss. Smartcard blacklisting in case of device loss. Remote smartcard PIN reset. Remote smartcard PIN reset.
9
ControlSphere is a universal software solution suitable for both individual users and small to medium companies. Thanks to a great number of custom settings, ControlSphere can be adapted to nearly any environment and help solving necessary logical access and data protection needs for its users.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.