Secure communication

In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

It has already been more than fifteen years since Trustica started providing its services in the field of secure communication over untrusted data networks and we are designing solutions for all imaginable variants of such communication. Should you need to secure a communication between your coworkers or ensure the communication with server systems remains confidential, we are at your service and not only we design communication with security on our mind but we also deliver fully functional implementations if requested.

■ ■ ■

Request Tracker

The Request Tracker system is used for implementing technical or customer support and keeping records of incoming phone, e-mail, web or other requests. With Request Tracker you always have perfect overview about tasks and their requesters, the issue status and which resources are missing for successfully finishing it. Your employees have exact information about requests assigned to them and when are they due.

■ ■ ■

Latest posts

Cryptoucan™ physical tamper protection

These are really busy times here at Trustica. We are producing the last few units using the single unit casting process but in the meantime we have already placed an order for a small batch to check whether the whole process is sound. In a few weeks we will know for sure. But in the meantime, read on to see what we have done to one unit.

■ ■ ■