Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.
Description
All-in-one tracking system for maximum optimization, insights and visibility. Automation. Monitoring the location and movement your assets with our end-toend solution is not only simple, but also profitable. Our easy-to-use solution will ensure that you never again lose track of your assets, whether you manage a fleet of transport vehicles, waste containers, valuable machinery, or a complicated supply chain. Monitor the use of your assets, identify bottlenecks and predict delays. Sensolus gives you the insight to maximize your assets. You can manage your inventory levels with confidence, knowing that you will always have the optimal stock available. Automating your inventory management will reduce the risk of excess stock and underused assets. Our automated activity log will lift the veil of doubt. You can use customizable alerts to ensure that third parties are held accountable for delivery times and locations, as well as the proper use of assets.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Web Services (AWS)
Elasticsearch
Google Workspace
Grafana Cloud
JSON
Microsoft 365
Microsoft Azure
Microsoft Excel
Microsoft Power BI
Integrations
Active Directory
Amazon Web Services (AWS)
Elasticsearch
Google Workspace
Grafana Cloud
JSON
Microsoft 365
Microsoft Azure
Microsoft Excel
Microsoft Power BI
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
TecSec
Country
United States
Website
www.tecsec.com
Vendor Details
Company Name
Sensolus
Country
Belgium
Website
www.sensolus.com
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Product Features
Asset Tracking
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
GPS Tracking
Alerts/Notifications
Asset Tracking
Driver Management
Historical Reporting
Mobile Tracking
People Tracking
Real Time Tracking
Routing
Status Tracking
Territory Management
Vehicle Tracking