Security

Unique benefits
  • Fully secured hardware implementation
  • Physical and logical protection
  • Insider threats protection
  • Strong multifactor authentication

  • Remote management
  • Impossibility to reveal/copy encryption keys
  • Unlimited number of encryption keys

Why hardware security only?
  • Absolut isolation of secret data
  • Physical hacking protection
  • Software hacking protection

  • Clear separation of duties between administrators
  • Dual controls where multiple administrators (quorum-based administration)
  • Load balancing and failover

Thales products currently protect data for
  • 80% of all payment card transactions in the world
  • 19 of the 20 largest banks in the world
  • 55 governments
  • 3,000 financial institutions worldwide

  • 9 out of 10 top engineering companies
  • 4 out of 5 top energy companies
  • 4 out of 5 aerospace companies

Users protection
Personal protection

  • Electronic digital signature
  • Token (Digipass)
  • Applet for smartphone
  • Smart-card
  • Mobile devices certificates

System protection

  • Electronic digital signature
  • Token (Digipass)
  • Applet for smartphone
  • Smart-card
  • Mobile devices certificates

How does it work?
Key management system on the basis of THALES HSM nShield module
MS SQL data encryption
System database

Security system remote management mechanism using THALES nShield Edge and smart-card with the security key
Safe access of the client`s mobile and web-applications through the secure channel

Transactions authentication system using safe SIGN technology

THALES nShield Edge, smart-card with the security keys
Computer
Smartphone, pad
Payment terminal

Comments are closed.