Changes

Jump to navigation Jump to search
1 byte removed ,  12 years ago
Line 31: Line 31:  
    
 
    
 
===Authentication===
 
===Authentication===
The company authenticates content, business websites and individuals which creates a trust that they are genuine and their original information in non-tampered. These authentication services are provided by way of
+
The company authenticates content, business websites and individuals which creates a trust that they are genuine and their original information in non-tampered. These authentication services are provided by way of:
 
    
 
    
* Extended Validation SSL Certificates<ref>[http://www.instantssl.com/ Instant SSL]</ref>  
+
* Extended Validation [[SSL Certificate]]s<ref>[http://www.instantssl.com/ Instant SSL]</ref>  
 
* Secure E-Mail  
 
* Secure E-Mail  
 
* Two-Factor Authentication  
 
* Two-Factor Authentication  
Line 39: Line 39:  
* Verification Engine<ref>[http://www.vengine.com/ COMODO Verification Engine]</ref>  
 
* Verification Engine<ref>[http://www.vengine.com/ COMODO Verification Engine]</ref>  
 
* Content Verification Certificates<ref>[http://www.vengine.com/ COMODO Verification Engine]</ref>
 
* Content Verification Certificates<ref>[http://www.vengine.com/ COMODO Verification Engine]</ref>
 
+
 
 
===Security===
 
===Security===
 
The services for securing information are provided by encrypting sensitive data at every stage of lifecycle through Strong Public Key Infrastructure (PKI) encryption as protection from the hackers. The company uses SSL/ Digital Certificates Servers for the purpose. E-commerce and other websites are checked for vulnerabilities and the IT organizations are alerted to these and configured with necessary security measures.
 
The services for securing information are provided by encrypting sensitive data at every stage of lifecycle through Strong Public Key Infrastructure (PKI) encryption as protection from the hackers. The company uses SSL/ Digital Certificates Servers for the purpose. E-commerce and other websites are checked for vulnerabilities and the IT organizations are alerted to these and configured with necessary security measures.

Navigation menu