GET Intelligent Key and Asset ManagementGET Group Holdings
|
Rohos Logon KeyTesline-Service
|
|||||
Related Products
|
||||||
About
The system provides full control over access to stored assets, and incorporates multi-level security features that prevent unauthorized parties from accessing the lockers and cabinets. Traka key systems only allow authorised users to access keys to physical assets, ensuring they remain accounted for at all times, and to avoid keys going missing, getting misplaced or getting into the wrong hands. Traka lockers solutions enable to track assets via our unique RFID technology. The devices can be charged so that they are always ready to be used and securely stored to avoid theft and misuse. Traka Web is a web based administration suite for centrally managing Traka Touch key and locker systems on almost any device that can run a browser, including phones, tablets and PC’s. It can support unlimited keys or assets.
|
About
Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes. Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Law enforcement agencies looking for an asset platform to secure, manage and audit the movement of keys, valuable equipment and weapons
|
Audience
Computer Security software for businesses
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$32 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationGET Group Holdings
Founded: 1987
United Arab Emirates
www.getgroup.com/safe-and-smart-cities/intelligent-key-and-asset-management/
|
Company InformationTesline-Service
www.rohos.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|