free software downloads
mainDOT.com Software
online shop
software catalogue, free downloads

CATEGORIES
  Audio & Multimedia
  Business
  Communications
  Desktop
  Development
  Education
  Games & Entertainment
  Graphic Apps
  Home & Hobby
  Network & Internet
  Security & Privacy
  ·Access Control
  ·Anti-Spam & Anti-Spy Tools
  ·Anti-Virus Tools
  ·Covert Surveillance
  ·Encryption Tools
  ·Other
  ·Password Managers
  Servers
  System Utilities
  Web Development

Contact


Special Offer for Software Publishers

Free Software Downloads
Proteg 3.1
Security & Privacy category

check the available software downloads subcategories

Software Details:

Company : Inflexpoint Technologies
File download size: 2115 kb
License : Shareware
OS: Windows2000, WinXP, Windows2003
Price: 29.90
Release date: 2004-07-01

Software Links:

Homepage: software homepage
Download link: Download
Screenshot: View screenshot
related: USB access control, Windows login, logon, USB storage device, thumbdrive, USB key, flash memory, two factor authentication, keyb

Proteg 3.1 description

Proteg is a software solution that secures the computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to a portable USB storage device (USB key, USB flash drive, thumdrive). Adopting two-factor authentication scheme, a Proteg-enabled system requires the user to present a physical hardware and provide the correct password to gain legitimate access to the system.

Proteg 3.1 review

Proteg is an innovative software solution that allows users to secure their personal or notebook computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to an ubiquitous hardware device, a portable USB storage device (USB Key, USB flash drive, thumbdrive). An additional hardware component becomes compulsory in order to login to the computer instead of relying solely on the conventional username and password pair. Due to the increasing threats, passwords - the way most people access their computers today - can no longer keep pace with the security requirements of today?s challenging computing world. Over the years the password technique has not kept up with new technologies and methods used by hackers. One can easily gain access to the latest hacking program, many freely available over the Internet, enabling unauthorized access to valuable information resources which reside in our computer. Unauthorized access also means invasion of our privacy. To better secure our information assets, Proteg provides a sophisticated technique for user identification and authentication to improve on passwords. This technique can certainly offer much greater security than passwords as this hardware based system (commonly known as two-factor authentication system) creates a physical link between a user and his identity. In a two-factor authentication system like Proteg, the user is required to present the physical hardware (something the user has) and provide the correct password (something the user knows) that corresponds to the said hardware in order to gain legitimate access to the system. Although smart cards and one-time password generator devices can be very effective in providing two-factor authentication, they are typically too expensive, difficult to manage and inflexible. Despite the enhanced level of security provided, these technologies come at high costs, much of which is due to added hardware component.

eXTReMe Tracker



mainDOT sites:  ·mainDOT main site  ·mainDOT Directory  ·mainDOT Seo Tools  ·mainDOT SHOP
online IT technology news feeds today