In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Cryptoucan™ usage: First look

As we are getting closer and closer to shipping first units of Cryptoucan™, we are also preparing series of videos which would guide our customers through the whole process of using the device itself and the use of it with specific operating systems and e-mail clients. Now we can proudly introduce you to the first video that will give you clear idea of what Cryptoucan™ looks like and what elements you can find on its outer body.

■ ■ ■