U

Secure system integration – Use Case #07

Secure system integration – Use Case #07

Secure system integration poses a challenge to any organisation. The information exchange must follow the organisation’s policy where threats towards the systems have been encountered for. It is critical that the information flow is controlled to limit attack vectors....
Secure remote desktop connections – Use Case #06

Secure remote desktop connections – Use Case #06

Providing secure and selective access to a system from a remote network is a challenge. The access must be adapted based on defined policies and tuned for the specific systems. It is critical that the sensitive information stays within the protected network and that...
Protecting personal integrity – Use Case #03

Protecting personal integrity – Use Case #03

Government agencies, law enforcement bodies and civil departments are all faced with the dilemma of checking personal information while complying with national and international regulations regarding data leakage. Information transfer is often performed using manual...