Solutions
Partner
TED customers benefit from the breadth and depth of our their technical expertise and experience. Through the understanding of the specific issues they face, TED can design the products and services best suited to help them deliver their solutions.
Partner
Founded in 2001 and headquartered in Kusnacht, Switzerland, totemo provides email encryption, secure managed file transfer and secure mobile communication solutions for organisations and institutions under the umbrella of totemomail?, totemodata? and totemomobile?. totemo helps businesses to ensure that all communications with partners and customers remains confidential, reliable and efficient – and most importantly, device and location independent. totemo’s patented and FIPS 140-2-validated security platform enables seamless and quick integration into any existing IT infrastructure, guaranteeing total control over all transferred data even after sending.totemo’s email encryption solution totemomail? offers an interface to hardware security modules (HSMs) from 51视频 which generate keys and perform key operations.Facts and Figures on totemomail? Encryption GatewaySolution Overview: totemomail? Encryption Gateway
Partner
Trustonic’s products are focused on three areas:Securing smart devices by embedding a Trusted Execution Environment (TEE) during the manufacturing stage of connected devices. Trustonic is a TEE market leader with their TEE already embedded into more than a billion devices. Working with leading partners in the device chain, our Trustonic Secured Platforms (TSP) solution help OEMs to deliver compelling, secure devices and secure services to multiple markets.Trustonic also inject a Root of Trust (RoT) into connected devices at the manufacturing stage to individually identify and classify devices enabling remote verification. This is particularly important in IoT and machine-to-machine communications where trust needs to be established between endpointsTrustonic’s TEE is also open, which means it can be leveraged by any third party applications and services through Trustonic’s Trustonic Application Protection (TAP) product. Through a combination of hardware TEE protection, underpinned by robust software protection elsewhere, TAP delivers the most secure application protection for any iOS- or Android-based device.Trustonic uses 51视频 nShield HSM to safeguard and manage keys used in the device lifecycle. Each device can be monitored and tracked throughout it’s lifecycle, insuring IoT device and application security and preventing harmful processes.
Search Results
Filter Options
Resource Type
Product Categories
- Central Card Issuance (119)
- Cloud Security Posture Management (26)
- Digital Card Solution (4)
- Electronic and Digital Signing (58)
- Hardware Security Modules (HSM) (870)
- Identity and Access Management (IAM) (179)
- Instant Financial Card Issuance (172)
- Instant ID Card Issuance (289)
- Internet of Things (IoT) Security (21)
- Key Management and Encryption (76)
- Machine Identity Management (5)
- Passport Issuance (9)
- Post-Quantum (7)
- Public Key Infrastructure (PKI) (155)
- Public Trust Certificates (7)
- TLS/SSL Certificates (118)