|
|
|
|
Ardeun
is delivered as "Software as a Service" and thus
being independently operated guarantees
complete security. |
|
|
|
|
|
|
|
When
Data is transmitted between the User, Provider
and Ardeun, it is Encrypted using AES 256 which
is beyond that specified by the US Department of
Defense. Encryption uses a one time only random
Key data and thus no pattern can be determined
by hackers, making this a fail safe method of data
transfer. In addition we use SSL data ports. |
|
|
|
|
|
|
|
|
One
time AES Keys are used to secure Ardeun data streams
thus making it impossible to hack data packets,
because the keys cannot be probed or guessed. |
|
|
|
|
|
|
|
|
|
Ardeun
Monitor is operated across multiple Servers. If
one server goes done, a back-up server
from an alternative location is in Sync and takes
over the processing. |
|
|
|
|
|
|
|
|
|
Should
any Ardeun servers malfunction the system automatically
diverts to a parallel server. |
|
|
|
|
|
|
|
|
|
There
is no Limit to the Size of the Ardeun Monitor databases.
As the system is designed to be Global and likewise
designed to be Territorial based on Company and
Location, nodes can be set up and expanded per
territory or per organization and enterprise. |
|
|
|
|
|
|
|
|
|
Ardeun
Monitor will connect to most types of databases
including ACCESS MS-SQL
and Oracle. |
|
|
|
|
Thus Ardeun Monitor
and Authenticator can be used an any environment
from Small to Medium Business requiring secure authentication
via a Managed Service, through to large scale Enterprise
solutions requiring internal SQL or Oracle. |
|
|
|
|
|
|
|
|
|
Ardeun provides
a complete Registration System to Providers to enable
their Customers to simply and easily create an Account
and to manage that account without creating any burden
on the Provider end. |
|
|
|
|
|
|
|
|
|
Ardeun
delivers a range of Authentication options into
an environment. |
|
|
|
|
A
specific authentication method can be deployed,
or a combination of methods deployed for for a
varying style and type of customer. This is all
done transparently and with only a few lines of
code imbedded into a web page. |
|
|
|
|
|