TraceTunnel for Symitar Users Encrypt EPISYS Traffic Transparently and Affordably - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

TraceTunnel for Symitar Users Encrypt EPISYS Traffic Transparently and Affordably

Description:

'Encryption of electronic member information, including while in transit or in ... Easy to Setup, Configure and Maintain. Setup takes moments to set up and configure ... – PowerPoint PPT presentation

Number of Views:130
Avg rating:3.0/5.0
Slides: 11
Provided by: TraceSe
Category:

less

Transcript and Presenter's Notes

Title: TraceTunnel for Symitar Users Encrypt EPISYS Traffic Transparently and Affordably


1
TraceTunnel for Symitar UsersEncrypt EPISYS
Traffic Transparently and Affordably
2
The Need for Encryption?
Why do I need encrypted communication for Episys?
GLBA NCUA Regulation Compliance Requirement
Appendix A to Part 748 Section 3C 1C page
317 Encryption of electronic member information,
including while in transit or in storage networks
of systems to which unauthorized individuals may
have access.
Page
TraceTunnel for Symitar Systems Overview
2
3
The Need for Encryption?
Key Points
Episys from Symitar does NOT encrypt traffic
GLBA NCUARegulationRequirement
Un-Encrypted Communication Exists between Episys
and Symitar The current Episys system console
does not support encryption and communicates via
clear text thereby putting your member data at
risk and your institution out of compliance.
Page
TraceTunnel for Symitar Systems Overview
3
4
The Need for Encryption?
Key Points
Why do I need encrypted communication for Episys?
GLBA NCUARegulationRequirement Current
Solution Communicates via Un-Encrypted Traffic
Clear Text Traffic can be easily Sniffed and
Captured Exposing Personal and Confidential
Information Simple to use and obtain sniffers
enable most to capture and analyze this
communication. Ethereal www.ethereal.com Nessus
www.nessus.org Visit www.sectools.org for many
more
Page
TraceTunnel for Symitar Systems Overview
4
5
The Solution!
Key Points
TraceTunnel Encrypts Episys Traffic
Definition or Explanation would go here.
Easy to Setup, Configure and Maintain Setup takes
moments to set up and configure Management is
almost non-existent once deployed Complete
compatibility with Symitar network environments
including Citrix servers and VPN solutions.
Page
TraceTunnel for Symitar Systems Overview
5
6
The Solution!
Key Points
TraceTunnel Encrypts Episys Traffic
Definition or Explanation would go here.
Transparent to the End User TraceTunnel works in
the background silently encrypting critical and
private data without interaction by the end
user. Very Ninja like.
Page
TraceTunnel for Symitar Systems Overview
6
7
The Solution!
Key Points
TraceTunnel Encrypts Episys Traffic
Definition or Explanation would go here.
Multi-Platform Support TraceTunnel was developed
with non-homogeneous networks in mind. Operating
System support includes gtWindows gtAIX gtMultiple
Versions of UNIX Linux gtMac OSX
Page
TraceTunnel for Symitar Systems Overview
7
8
How Does it Work?
TraceTunnel in Action...and Not in Action
Current Symitar Episys Communication
user namejjonespasswordcatss434
Episys end user logins in and retrieves data that
is un-encrypted
Page
TraceTunnel for Symitar Systems Overview
8
9
How Does it Work?
TraceTunnel in Action...and Not in Action
Episys Communication with TraceTunnel
!eyu98moihpas-765lt((km)hgv__yu
Episys end user logins in and retrieves data that
is encrypted transparently
Page
TraceTunnel for Symitar Systems Overview
9
10
TraceTunnel for SymitarTRACESECURITY,
INC.WWW.TRACESECURITY.COMP 877-275-3009E
INFORMATION_at_TRACESECURITY.COM
Write a Comment
User Comments (0)
About PowerShow.com