QTRUST

 

 

QTrust 2go Life

QTrust 2go Life integrates the person‘s physical identity into the security concept when accessing data, in accordance with QGroup’s IT Security Strategy 2.0. Based on the QTrust Server, we have developed a highly secure solution that makes it possible to access sensitive company data and applications. This is done by means of a three-factor token that includes the user‘s fingerprint as a biometric component. After being successfully identified, authorized users are given encoded access only to the data and application areas for which they have authorization. The QTrust 2go Life Token provides a separate, secure communications channel for authentication that occurs before application access is granted. The accessible data and applications remain in the computer centre and are secured by means of the PitBull Trusted Operating System that runs on the QTrust server. Using PitBull prevents an unauthorized flow of data between logged-in users.

QTrust 2go is simple

• Simple handling for end users
• Simple administration processes
• Does not require installation
• Can be integrated into existing VPN solutions

QTrust 2go is secure

• A unique, physical identity is ensured by biometric data
• A three-stage security process
• No phishing, no bugging
• Includes silent alarms
• Based on the QTrust Server with PitBull – the certified Trusted Operating System

QTrust 2go is available

• Immediate use with existing applications (with no customizing)
• Can be used everywhere on an equipment- independent basis
• Platform-independent – clients for Windows, Mac OS X, iPad®, iPhone®
• Thin Client Support



QTrust 2go Smart

QTrust 2go Smart integrates the person‘s physical identity into the security concept when accessing data, in accordance with QGroup’s IT Security Strategy 2.0. Based on our QTrust products, we have developed a solution that allows end customers to carry out secure authentication when using a smartphone to access specific business areas and applications.
The smartphone represents a separate authentication channel in this process – the data and applications are released after you enter your user name and a one-time password. To generate this one-time password, you use your phone‘s camera to load a 2D barcode that is displayed on the screen. A biometric input is the third identification factor: final authentication is by means of facial recognition. This version of QTrust 2go Life, which uses a smartphone instead of the QTrust 2go Life Token, guarantees convenient and secure use of the enabled areas. You can integrate any commercially available smartphone into the QTrust 2go Smart authentication process.
The accessible data and applications are in the computer centre and are secured by means of the PitBull Trusted Operating System that runs on the QTrust server. Using PitBull prevents the unauthorized flow of data between logged-in users.

QTrust 2go is simple

• Simple handling for end users
• Simple administration processes
• Does not require installation
• Can be integrated into existing VPN solutions

QTrust 2go is secure

• A unique physical identity is ensured by biometric data
• A three-stage security process
• No phishing, no bugging
• Includes Silent alarms
• Based on the QTrust Server with PitBull – the certified Trusted Operating System

QTrust 2go is available

• Immediate use with existing applications (with no customizing)
• Can be used everywhere on an equipment- independent basis
• Platform-independent – clients for Windows, Mac OS X, iPad®, iPhone®
• Thin Client Support

 

 


QTrust Server

QTrust Server is a highly secure solution that has been designed for the particular security requirements of companies handling data that needs to be protected. As an application-level firewall, QTrust Server unites application and network security functions in an easy-to-administer appliance.

The QTrust Server acts as the interface between secure and non-secure networks, and it prevents any and all exchange of data between the connected networks. The QTrust Server decouples and checks all connections – both at the network (IP) and application levels.

All the services on servers in the internal networks or the DMZs are mirrored outwards by the QTrust Server. In its role as an intermediary (secure gateway), the QTrust Server carries out communication and protects the systems behind it using the sandbox principle.

In addition to Application Proxying and Content Scanning, the QTrust Server has a comprehensive range of logging and reporting functions that allow you to carry out detailed diagnostics. When attacks occur, the integrated Intrusion Detection System (IDS) triggers an alarm and the attacker can then be blocked directly (IPS).

The QTrust Principle

The QTrust Principle means that all the services on the QTrust Server are completely separated from one another by the underlying mechanisms of the Trusted Operating System. This PitBull technology is embedded in the operating system core – in the kernel – and protects the entire system at the highest levels, which has generally only been available for military and classified intelligence applications. Each module or service runs on a completely isolated basis from the other services in the system as if they were on different computers. Individual modules or services either cannot communicate or they can only exchange data with one another with controlled and strictly limited regulation. This means that an attack on one of the services has no effect on the other services. They remain completely untouched.

Only PitBull technology makes it possible to offer this highly complex range of functions in an extremely secure central system. The QTrust Server has available all the necessary interfaces and standards that are necessary for a Security Appliance. This makes possible seamless and problem-free integration into existing infrastructures at any time. The QTrust Server with the Trusted Operating System provides the basis of implementing the QTrust IT Security Strategy 2.0.

The function principle is that each module or service is operated in complete isolation from the other services on the system, as if the services were running distributed among different computers. The individual modules/services cannot communicate with one another or exchange data, or may do so only on the basis of strict limiting rules. That way, an attack on one of the services will not affect the others. They remain totally untouched.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

To see the QTrust 2go in operation please click here: QTrust 2go Overview - QTrust_2go - Overview (15.7Mb) Right Click on link to download.

Alternatively -

For more information on the QTrust Solutions or to arrange a meeting with a Unicus representative to discuss further, please email your contact details to: info@unicus-ict.co.za

 

 

________________________________________________________________________________________________

All Rights Reserved. Copyright ©UNICUS-ICT Solu(it)ons 2013. Designed & Hosted by BirdieBox Internet Services - www.bbis.co.za