Aladdin Knowledge Systems' eToken Drivers get Microsoft WHQL Certification
by Mirko Zorz - Thursday, 2 January 2003.
The drivers for Aladdin Knowledge Systems' eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows 2000 the possibility to automatically identify eToken drivers and recognizes them as trusted. Aladdin customers can now install eToken drivers using Windows Installer which will place the driver on any Windows 9x/NT/2000 operating system environment as seamlessly as installing applications on a home PC.

Leedor Agam, vice president, eToken Solutions said: "eToken delivers value in a variety of ways, including its simple, straightforward implementation. WHQL certification is solid evidence that eToken is an enterprise-ready security solution optimized for Windows OS network environments."

eToken is a USB device about the size of a normal house key that offers a portable and cost-effective means to authenticate users and to digitally sign sensitive business transactions.

Utilizing state of the art technology, eToken PRO offers advanced smart card functionality with a robust onboard cryptographic processor such as 1024-bit RSA, 3xDES and SHA1. eToken PRO offers an unmatched level of physical and logical protection with its ITSEC LE4 smart card chip security accreditation. With its onboard 1024-bit RSA processor, eToken PRO is the ideal solution for PKI enabled applications. Since all operations, signing and PKI key generation are done on the token itself, sensitive data is kept away from the hostile environment of the PC.

eToken R2 offers simple yet robust 120bit DESX onboard security functionality as its underlying technology. Both the eToken PRO and the R2 offer enhanced physical features in their newly designed one-piece plastic housing, providing an unmatched tamper-evident and water-resistant container. Support for open, non-proprietary security standards such as Microsoft CAPI & PKCS11, makes integration with security applications quick and smooth.

Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //