Asc-egypt.org is in the field information security in Egypt and Middle East.

Title

Arab Security Consultants - ASC ( Smart Security Solutions )

Description

Excerpted from the website:

Welcome to ASC - Arab Security Consultants firm, one of the few firms operating in the field of information security in Egypt and the Middle East. Our Firm was launched in March 2007 as a unique body providing high quality e-services. In three years, we stepped forward and achieved a lot of progress that put us today among the leading companies of the research and development fields. ASC is specified in information security, network security, and staff training and development to guide the different entities in reaching cyber security and securing their work environment. The quality profiles of the professionals appointed by ASC for working in its poll concerned with security strategies and technologies drives the business forward and maximizes the value of the services provided by ASC. Our Aim is to provide entities handling confidential data such as banks and financial service providers that constantly face challenges to safeguard customer's data, with a consistent and secure environment. We managed to do this through our integrated solutions using Smart Token. We guarantee you a secured working environment through our technology based systems and the highly structured staff trainings that we provide.
read more

Additional Information

Products: a)CrypTok Secure Login - is a module that secures the authentication of system user based on token usage and concrete protocol using challenge system and digital signature.

b)CrypTok File Encryption - is an application which encrypts the files and folders based on Smart Token usage and stores all encrypted files in some repository and encrypted file description.

c)CrypTok Dual Decryption - is an application encrypts files and folders with new mechanism which is based on smart Token usage; this mechanism uses one token for the Encryption process and two tokens for the decryption process, and facilitates the searching and describes the encrypted files.

d)CrypTok Multi user File Encryption - is an application that Encrypts and decrypts files and folders. This application provides a transparent way to encrypt and decrypt files and/or folders based on ten similar Smart Tokens for Encryption and decryption process and one Smart Token for monitoring the activity of the ten tokens after secure login and authentication for all system users.

e)CrypTok E-mail Security - The main functionality of the application of e-mail protection (CrypTok E-mail client) is to send the messages (body and attachments) encrypted using session key. It encrypts messages and attachments using receiver public key. The decryption is performed using the private key and those keys are stored as a pair on token and the encryption and decryption operations are performed on the token itself which makes the system more secure. CrypTok can deal with free mail servers like hotmail, yahoo, Gmail, etc or special mail server.

f)CrypTok Data Base Encryption - is an application that encrypts any database fields with new mechanism which is based on Smart Token usage. This mechanism uses one Smart Token for encrypting database values regardless which Data Base Management System (DBMS) is used.

g)CrypTok Secure FTP - application is client and server architecture, the SSFTP provides you with a secure transfer of data and strong authentication protocol. Securing transfer means that the transferred data are encrypted and come from authorized person signed with Digital signature and also stored encrypted on the server so you can use it from any computer as it is a web application or put on the disk and uses it as desktop application.

h)Secure Web Solutions ( WebEnc ) - The data flow from the web page to the server is encrypted to be stored in a DB.

The website user fills the sign up form, all the information about that user is encrypted before transfered to the server.

only the admin which have the Smart Token can decrypt the client data.

The keys for Encryption & Decryption can be changed periodically according to the request.

Services: 1-Security assesment

2-Penetration testing

3-Data security consultation

4-Business Continuity Plan BCP

5-Disaster Recovery Plan DRP

6-Vulnerability Assessment

7-Security Courses like CEH ( Certified Ethical Hacker ),….

Training: ASC is appointed to be EC-COUNCIL representative & the only distributer in EGYPT from September 1st ,2010 -- Ethical Hacking & Countermeasures - CEH The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

External Links

Domain Resolution

This domain resolves to the following IP addresses:


Retrieved from "http://aboutus.com/index.php?title=Asc-egypt.org&oldid=59113393"