Adertisment from The Association of theSecurity and Defense Industry in North Rhine-WestPhallia.
www.gsw-nrw,de
regarding the X-key and X-ms- they even mention the cost for your own complete systems starting at around 5 million Euro
Simple, safe, worldwide
Access to any computers, servers,
Bank accounts or Web portals --
This is the X-MS AG. To
Safe and performing to realize
X-MS has the world's security network
X-KEY-NET
Installed the Internet, including
Its own switching technology
And including a
Trust own center. Users
Of the network, X-MS for safe
And clearly identifying each
An X-KEY as a key to
, A small USB stick
With a smart card (SIM). Finally,
Belong to the X-KEY technology
Certificates yet highly efficient
And encrypted data transmission
And a complete
Public key infrastructure (PKI).
Easy to use
However, the complex structure remains for the
Users invisible. The X-KEY is everything
He needed for his work. Pleasure can
He any, connected to the Internet
Windows PC, you can catch up
With his office PC.
The USB stick is inserted into a
Free USB port, the software loads
Automatically in the memory of the host -
PCs, and the user identifies himself over
His password. With a click he chooses
Then select the desired connection and
Works - such as from a hotel in China --
His office PC as he sitting at home
Desk. For this we have the XKEY -
NET simply the screen surface
With the host PC "Enterprise", conversely keyboard
And tax data - of course everything
Encrypted. The office is in full PC
Extent available, each program, each application,
Each peripheral device, each record
And of course the complete network
Environment.
Certified Safety
The security of the system is often tested
And confirmed. Secret
Use the system, as well as the top -
Management of large corporations, the police
As well as patent attorneys, whose information
And data under any circumstances
The public. The Foreign Ministry
A European neighbouring country
Equips its embassies with the XKEY
In order to secure access to key
Data. Naturally
All connections are encrypted and
Against "man in the middle" attacks secured.
Stay on the course
Host PC used no data back
(Zero-Footprint). Of course, the
Private key of the user on the SIMKarte
So that he secured
Memory never leaves, and not from the outside
Readable. And if the password several times
Incorrectly, is the access mechanism
Irrevocably erased. In the summer
2007 was also at the system
NATO-technology session of the Chairman of
The Joint Chiefs of Staff (CWID) in a
Large tested and approved.
The results were published.
Scalability
One of the main advantages of the X-KEYTechnologie
It is that businesses, public
Administrations and other institutions
Quite simply with a single XKEY
Can start in the space of a few
Minutes completely furnished and functional
. There is no administration
X-MS AG
Necessary, the entire administration is done
Automatically within the X-KEYNETs.
The monthly operating costs
In the 20 euro area. To greater independence
From the "public" network to gain
Install some customers switching technology
Completely in its own network, the cost
Are around € 100,000. Military Users
Finally, public administrations,
Major European carriers but also some
Banks tend to a completely autonomous,
To install its own network. That is
Possible. The costs depend on the
Number of users, the investment is starting
In a 5-million-euro area.
Use scenarios
Basically, the X-KEY technology
Always be used if more flexible
Access to confidential data or
Confidential data protected environments
Under no circumstances should leave. The
True for managers, often secret information
On their notebook to the world
Drag, as well as for administrative employees
Or bank employees, who get
At home or on the data
Need access. Their protection law
Guaranteed. This applies also for the police,
Firemen, civil protection and military
Institutions, for the flexibility
Access to centralized information is essential
Is to provide information to their very nature, always
Confidential or secret. From the multitude
The possible and actually realized
Applications Here are some examples:
Emergency preparedness tropics: continuation of the operation
Loss or unavailability
Job by natural or other
Disasters, in the case of pandemics or
Just in case of an extended
Strikes.
Building data for the fire brigade: Distributed
Access to comprehensive, centralized data
Of a mobile PC in safe
Identification of the user.
Location Systems: Distributed access to central
Location systems from different organizations
From any location.
Fahndungsdateien: Secured decentralised
Access to protected data.
Home job: working from any
PC, which neither particularly set
Still needs to be managed.
The X-MS AG
The focus of the X-MS AG is economically
Successful mobile solutions. People
The mobile, and will draw information
Sharing must be our target group.
With high-tech products
We shape economically successful
Processes. This, we Available
Intelligent systems with interfaces to
Work processes and the people involved
. So it is the necessary, complex
Technology for the user is often not even
Visible. The X-MS AG since 1999
Market and has since 2006 completely
Focused on mobile solutions. It operates in
Europe, the Middle East and Africa.
X-MS AG
18 Market Street
53902 Bad Münstereifel
Contact:
Horst Dahmen, Chief
Telephone: 0180 5005 10 6000
Fax: 0180 5005 10 6001
E-mail: info@x-ms.com