Please click here to check who's online and chat with them.

Find Verified Encryption Software Suppliers, Manufacturers and Wholesalers

Top Supplier Cities : Seoul   Gyeonggi-Do   Incheon  
May-16-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 1 of authentication service method before transaction

Ensure secure card transaction through credit card owner's authentication
before transaction

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
May-16-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 3 of authentication service method before transaction

The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
GOLD Member
VERIFIED
Oct-19-20
Supplier From Seoul, South Korea (Republic Of Korea)
GOLD Member
Nov-21-24
Supplier From Seoul, South Korea (Republic Of Korea)
Jun-12-15

Hi-Ware

MOQ: Not Specified
Supplier From Seoul, Yeoungdeungpo-Gu, South Korea (Republic Of Korea)
 
HI-WARE is an IAM Solution which integrates HI-TAM (Access Management Solution), HI-DBAM (Database Access Management Solution), HI-TIM (Identity Management Solution) and HI-DBIM (Database Identity Management Solution), built and enhanced with years of experience by the best engineers.

HI-TAM and HI-TIM work together as HI-WARE, solution for secure authentication, access management, activity monitor log, SSO, and many more features in a single platform.
HI-WARE eliminates problems that can arise from heterogeneous solutions, solidifying security of your data, as well as great enhancement in convenience for the users by utilizing single UI and process.
175 Encryption Software Suppliers
Short on time? Let Encryption Software sellers contact you.
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 2 of authentication service method before transaction

Ensure setting the periods and the number of secure card transactions through credit card owner's authentication before transactions

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 3 of authentication service method before transaction

The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 1 of authentication service method before transaction

Ensure secure card transaction through credit card owner's authentication
before transaction

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
Jun-27-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
The foremost solution for protecting your PCâ??s information and for regulating your childrenâ??s computer and internet usage in order to prevent addictive behavior.

1) Service content

This is a program which is executed every time the PC is turned on. You will be able to login to your PC only when you have approved of the login request from your smartphone. In other words, this is a PC login approval service. The S2K Login Technology protects your whole computer and all of the information present from being accessed by an unauthorized individual. This technology has received a GS (Good Software) Certification by the Software Testing and Certification Laboratory.

2) Service characteristics

It prohibits any access to a PC without appropriate approval
It allows for the user to access their PC at times when their smartphone does not have a network connection or no battery power.
It has an easy UI experience that does not require a learning process.
It has the potential to be implemented with powerful encryption technology such as Public Key and also Transaction Synchronized OTP
It has the potential to replace the role of ID Cards.
Jun-27-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
SSH VPN allows you to securely access and connect to your company is network from an external area via the Internet, so you can use your company is email, business applications, file sharing, printer sharing, and also remote desktop connections. It also accesses the company network and connects with the gateway server which allows for connection to the company is external servers and networks.

A solutions that allows for employees to gain access to corporate servers and information from remote locations outside of the company in a completely secure manner.
Jun-11-15
Supplier From Seoul, Yeoungdeungpo-Gu, South Korea (Republic Of Korea)
Mar-20-17
Supplier From Seoul, South Korea (Republic Of Korea)
Sep-16-06
Supplier From Seoul, South Korea (Republic Of Korea)
Mar-13-00
Supplier From Seoul, Seoul, South Korea (Republic Of Korea)
Mar-28-06
Supplier From Seoul, South Korea (Republic Of Korea)
Dec-22-04
Supplier From Seoul, South Korea (Republic Of Korea)
Jul-31-08
Supplier From Seoul, South Korea (Republic Of Korea)
Jun-03-20
Supplier From Seoul, South Korea (Republic Of Korea)
Apr-17-09
Supplier From Seoul, Kangnam-gu, South Korea (Republic Of Korea)
Mar-28-02
Supplier From Seoul, Seoul, South Korea (Republic Of Korea)
175 Encryption Software Suppliers
Short on time? Let Encryption Software sellers contact you.