The TASHILON SecuredArea Product Suite


The TASHILON SecuredArea Product Suite

 

SecuredArea Client

    The SecuredArea client installs itself in your computer's operating system. It's main purpose is to boost the level of encryption being used by your Internet applications. The client comprises the following components

    The Encryption Module

    Automatically correcting the weak links and loopholes in current encryption levels, the Encryption Module powerfully enhances and boosts any encryption application. It upgrades the current level of encryption used by your Internet applications, switching them to a regularly updated top-level encryption algorithm.

    In a similar way that an antivirus protects against infection, the Encryption Module ensures that your level of encryption employed by your Internet applications is kept in line with the latest technological developments.

    Network Sentinel

    The Network Sentinel is positioned strategically between the application level and the network in your computer's operating system. It filters all outbound traffic, directing communications requiring encryption to the Encryption Module.

    The Network Sentinel allows you to set the level of the encryption filter to provide maximum performance where it is most needed. For example, you may want to use the highest level of encryption when engaging in e-banking, but a lower level for other transactions.

    Live Update System

    There is no need to remember to check for new encryption updates. The Live Update System does it automatically for you. Every time the SecuredArea client is started, it contacts the TASHILON Server to check if upgrading is needed. This gives you the peace of mind to proceed with your daily Internet business with the confidence that the highest level of security is being used.

    The TASHILON Computer Fingerprint

    Using a proprietary algorithm, TASHILON analyzes the users hardware components and software profiles and generates a unique digital signature or "Computer Fingerprint" for each user. Users can be reliably and totally authenticated by their "Computer Fingerprints" and all communications remain private and completely secure.