PID
3082921

S2K SSH VPN

share

Request For Quotation
S2K SSH VPN
Award
Shipping
Payment

140+ Global Payments, trusted and secure payment provided by PayVerse.

Learn More

Detailed Description

PRODUCT DETAIL


1. Introduction
- S2KLogin SSH VPN securing your local (SSH) and remote UNIX logins lets you protect your

  developers and source code against remote attacks on your production systems and other

  critical networks. → S2KLogin SSH VPN to protect your SSH servers.
- Adding the extra tracking features onto the 2FA(2 Factor Authentication)system could gain

  the company to activate the audit trails on each machine which would generate a large

  amount of logs.


2. Detail explanation
 Our goal is to provide an efficient and convenient security service to our clients. S2K login service is

 designed to be installed easily, uninstalled easily, and most importantly, to serve as a strong security

 agent for your servers. Media coverage has ensured that many people have heard or read about the

 tremendous number of security breaches that have occurred in the past few years at businesses

 such as Target, Neiman Marcus, Home Depot, J.P. Morgan Chase, Sony and Ashley Madison.

 IoT technology has become the center of many services and infrastructure of our lives, and most

 likely will be applied to more fields. 


 


Businesses are trying to apply the technology to as many fields as possible, but are less

concerned about how they protect the thousands of the devices from numerous security flaws.

S2K SSH VPN solution has up to 7 layers of security (from the physical layer to the application

layer), which have to be paired appropriately with one another in order to access to the targeted

VM (or any connectible entity within the network).         


 


This secured solution guarantees that any unauthorized individual is not able to get into your

protected server even though your UserID and Password leak out. In addition, our Web platform

is designed to administrate the connections between users and servers conveniently.
   Here is a picture briefly showing the overall structure of S2K security solition. A normal

registration process is to be done in order of mobile, VM / Server, Web platform. However,

for your convenience, if you register your ID first on the Web Platform and then sign up on your

mobile, it will automatically work if you use the same ID. This user manual will focus primarily

on the process starting with mobile sign-up. If you understand this procedure, the opposite

procedure will naturally be understood.       


3. Usage         

                                        S2K SSH VPN Network Diagram  


  

                                  2FA(Two Factor Authentication) Precedure 

 

[Feature]
- Password Free Login
- Easy User Interface
- Safety From Data Farming Websites
- Risk Based Authentication
- Be useful for companies that have a lot of traffic into their servers From SSH VPN access points.
- Protecting your developers and source code against remote attacks on your

  production systems and other critical networks

 

 

 


COMPANY INTRODUCTION 


[2009~2012]
1.Enterpreneurship Competition Main Award(Content Security  Technologies)
2.Venture Company Acccreditation(Technology Guarantee Fund)
3.ISO 2009 Certification(Crebiz Certification)
[2013~2014]
4.Certified service technology transfer(ETRI) based on wearable devices.
5. 1 Room, 1 Company Enterprise Support Certificate(ETRI, open authentication technology)
6.Seoul Rising Star Enterprise Certification(Seoul Business Agency/Seoul, Korea Credit

   Guarantee Foundation)
[2015~2016]
7.TTA V&V and GS Certified (Secure2Key)
8.Participation in seminars and demoday organized by the Financial Supervisory Service
9.MOB Service-Nonghyeop MOB Commercialization
10.Supply S2K Beacon Attendance Solution (Korea University)
11.Supply IoT Security solution (SKT Telecom)


● COMPANY VISION 
“We will do our best to provide services, which are absolutely necessary and also beneficial

 for people, with the highest standards of quality and usability on top of being aesthetically pleasing.”


● BUSINESS MODEL


- IoT Security 

- S2K(Authentication Before Transaction Service) Technology Based Business



Keyword

Product Data

Other products of this company

QR Code

Scanning the QR code
will take you to the page, which you can easily share.

QR Code image