All our products are based on StoredSafe Secure Platform. Our security platform gives you: Strong encryption, Role Based Access Control, a full audit trail and two Factor Authentication. See more details under Platform
StoredSafe provides the following key solutions
Most organizations today are facing a challenge with critical passwords and encryption keys. The necessity to share certain accounts password within an organization with the challenge to provide full audit trails, are currently in conflict with basic compliance requirements and common security practices.
The primary objective of Password StoredSafe is to securely store and share passwords as well as other critical information related to your passwords on a “real” need to know basis with a full audit trail. Our solution ensures that even the system administrators have no access to the critical information and the Information owner owns the master encryption key – The information owner remains in control!
Password StoredSafe enables you to securely store, ensure and prove that passwords, encryption keys, pin codes and passphrases are known to and restricted to only authorized personnel. Furthermore it provides critical information such as who has seen what password and when, password last changed, password strengths, etc.
File StoredSafe ensures the confidentiality of your most business critical information.
File StoredSafe enables you to assure and prove that your information is restricted, only accessed by authorized personnel and provides data of who has seen what information and when. You are also able to share this information in a fully controlled manner to external individuals. Not even your system administrators will be able to read your encrypted information. The information owner remains in control!
File StoredSafe is used by our customers to store highly confidential data such as:
File StoredSafe enables you to assure and prove that your information is accessed only by authorized personnel and provides data of who has seen what information and when. You are also able to share this information in a fully controlled manner to specified external individuals without fuzz. Not even your system administrator with root access will be able to read your encrypted information.
Our turnkey appliance enables your organization to implement two factor authentication to various information sources. Two Factor Authentication StoredSafe makes a 2FA implementation a breeze and add a second layer of security to your existing IT infrastructure. Our highly recommended solution for easy roll-out and low cost lifecycle management of two factor authentication tokens is YubiKeys from Yubico.
Example of common Two Factor Authentication StoredSafe Implementations:
The primary goal of Two Factor Authentication StoredSafe is to strengthen an existing authentication mechanism such as AD/LDAP or another RADIUS by adding the second factor authentication (currently YubiKeys and Google Authenticator). Our solution integrates easy with current IT infrastructure without any major redesigns.
To enable ease administration, Auto Provisioning glues the username of a successfully authenticated user together with the yubico id of a validated OTP. This only occurs the first time the user authenticates. Next time the user is associated with his/her YubiKey id.
There is also support for doing OTP-bypass if you have service accounts that cannot handle OTP, such as RANCID, Tuffin, etc.
Two Factor Authentication StoredSafe will forward the original IP-address of the client as a Calling-Station-ID and will also proxy back attributes set by another authentication (RADIUS) server.
Public Key infrastructure (PKI) is a critical security enabler. However, faulty configurations and poor control, pose a major risk. Most organizations today rely on several different PKI components and vendors to achieve and secure inter-system data transfer, cross organizational communication, client logon and system access.
Certificate StoredSafe enables you to securely store, ensure and prove that certificates and related information are known to and restricted to only authorized personnel. Furthermore it provides critical information such as who has seen what certificate key passphrase, certificate last changed, certificate expirations, etc.
Certificate StoredSafe will reduce your risk significantly as well as improving your incident response capability by raising your control level, helping you monitor, alert and respond to operational risks posed by any certificate in you environment without vendor specific limitations.
Example of usage of your one stop shop for certificate information:
This product is the one storing certificate signing requests, certificates, certificate key files and confidential information related to your PKI-Infrastructure.