Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.

Description

SoftControl offers a range of products aimed at enhancing information security for commercial enterprises. Their solutions focus on safeguarding businesses by providing proactive defenses against threats such as hacking attempts, malicious software, and insider risks. Additionally, they facilitate effective staff monitoring and control. Their offerings include specialized software and solutions for Automated Process Control Systems (APCS), ensuring centralized security management. In the banking sector, SoftControl's information security policies are designed to protect vital infrastructure, including software for ATMs, as well as front and back-office operations. They also provide robust protection for electronic banking documents and secure business communications, including confidential data sent via email attachments. Furthermore, their solutions help organizations comply with PCI DSS standards and regulations set forth by the Central Bank of Russia. Overall, SoftControl stands out as a comprehensive provider, addressing the multifaceted challenges of information security in today's digital landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$25.00/one-time/user
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

TecSec

Country

United States

Website

www.tecsec.com

Vendor Details

Company Name

SafenSoft

Founded

2006

Country

Russian Federation

Website

www.safensoft.com

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

VaultCore Reviews

VaultCore

Fornetix

Alternatives

Nfusion Reviews

Nfusion

Ntrepid
Coro Reviews

Coro

Coro Cybersecurity
BlueFiles Reviews

BlueFiles

Forecomm
Tripwire Reviews

Tripwire

Fortra