INGATE

From The Sip Trunking Experts

TMCNet:  Becrypt shows latest innovations in secure Virtual Desktop Infrastructure with tVolution at RSA 2013; RSA Conference 2013, San Francisco, February 25 - March 1; Becrypt Inc. Booth #442

[February 22, 2013]

Becrypt shows latest innovations in secure Virtual Desktop Infrastructure with tVolution at RSA 2013; RSA Conference 2013, San Francisco, February 25 - March 1; Becrypt Inc. Booth #442

(M2 PressWIRE Via Acquire Media NewsEdge) London, UK - Becrypt, a leading supplier of cyber security solutions to national governments, law enforcement agencies, the defense industry and other public and commercial sector organizations, will be exhibiting its latest innovative solutions at RSA. In addition to its award winning and Government certified encryption and end-point security solutions, Becrypt will be showcasing tVolution, a secure FIPS 140-2 compliant end-point operating system. tVolution was designed for high threat environments to enable security conscious organizations to cost-effectively secure and manage end-point access to VDI (Virtual Desktop Infrastructure) resources.


Typical VDI solutions enforce security at the data center rather than at the network perimeter. What makes tVolution unique is that it addresses this vulnerability by ensuring that security policy is enforced at the end-point, preventing any unauthorized data transfer at the network perimeter. tVolution provides built-in security controls to restrict user access, prevent data leakage and provide encryption - without the need to install, run and manage any additional operating systems or third party applications on the end-points. In higher threat environments tVolution can be configured to fully encrypt end-devices, which also enables safe deployment in remote (outside the wire) locations. tVolution offers unmatched security with patented Becrypt RAM scrubbing ensuring that no sensitive data is retained on an end-point once shutdown, ultimately reducing the security rating of the device while not in use.

tVolution can either be embedded on end-points (thin and thick clients) or streamed via the network (zero clients) or a combination of the two. This unique solution is suitable for all commercial environments and is particularly fitted for Federal and Department of Defense deployments (both SIPRNet and NIPRNet), as it supports SIPR token, CAC and PIV smart card authentication. tVolution is also highly customizable, enabling customers to maximize security while maintaining a strong focus on user experience and usability.

Bernard Parsons, CEO of Becrypt said; "tVolution has been designed with security in mind from the outset, unlike many other VDI solutions. At Becrypt we pride ourselves in developing novel solutions to complex security issues, always with a view to providing as much flexibility as possible and enhancing the user experience, while keeping costs down." tVolution has been successfully deployed by US and UK government agencies to reduce end-point operating costs, increase security levels of VDI estates and enable flexible remote working solutions.

tVolution is compatible with Citrix, Microsoft, Quest and VMware virtual environments and can be deployed on new, existing or a mixed multi-vendor hardware estate without compromising security, performance or end-user experience.

NOTES TO EDITORS About Becrypt Becrypt is a leading supplier of innovative Information Assurance solutions and services, providing secure, feature-rich, out-of-the-box products that are government-certified and suitable for all industry sectors. Becrypt provides a range of cyber security solutions to protect data at rest and data in use. This includes top-level encryption solutions for servers, desktops, laptops and tablet devices, as well as end point solutions that enable secure mobile working and secure virtual and cloud resources access.

Becrypt products protect customers in key government areas including: central, federal, state and local government, the defense sector, law enforcement and transportation.

Becrypt's Cryptographic Library has been certified through the Cryptographic Module Validation Program (CMVP) at FIPS 140-2 Level 1. The Cryptographic Library provides support for all of Becrypt's data security solutions requiring assured cryptographic functionalities and services. The full range of innovative Becrypt products is available to the U.S. and Canadian Federal governments and organizations requiring a FIPS compliant solution.

Through technology and OEM partnerships Becrypt also enables third-party solutions with top-level data security and embedded endpoint security capabilities.

Becrypt has offices in McLean, Virginia, USA, and London, UK servicing customers worldwide.

For more information please visit: www.becrypt.com For Media Resources including high resolution image downloads please visit: http://www.becrypt.com/news-events/news Editors Contacts Keith Ricketts Marketing Director Becrypt +44 (0) 7809 391 037 kricketts@becrypt.com Andreina West/Mary Phillips PR Artistry Limited +44 (0) 1491 639500 andreina@pra-ltd.co.uk ((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to info@m2.com)).

(c) 2013 M2 COMMUNICATIONS

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner

Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.

Featured Case Studies

Case Study - Haiti
With this solution our doctors were able to reach anywhere in the world quickly and easily, to get consults from colleagues, facilitate treatment, order supplies 'on the fly' and also help victims report back to families. The solution from Business Mobility Systems and Ingate worked immediately.

Case Study - Turkish Petroleum
"With one Ingate at the customer headquarters, all of their remote workers can enjoy the benefits of Turkish Petroleum's IP-PBX from anywhere in the world.

Case Study - GCM
"The Ingate solution overcomes the NAT traversal hurdle and makes it possible to connect customers to our VoIP service, without the need of costly leased lines or support intensive VPN tunnels.

Case Study - Kool Smiles
"Ingate's solutions provide the advanced level of security necessary for this medical environment and the tools to make the interface to the service provider hassle-free."

Case Study - NMSAS
"This solution really saved the day for us," said Paul Mercier, IT Administrator, NMSAS. "We needed to leverage SIP trunks to reduce costs, and they had to work with our existing Microsoft OCS investment."

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.