Information Security offers a variety of applications to protect your data and identify:
A security application that requires two methods (known as factors) to verify your identity before accessing your system. These factors may include a username and password in combination with a smartphone app to approve authentication requests. Once 2FA is activated on your device, it authenticates anywhere and anytime, making it much more difficult for unauthorized users to exploit weak or stolen credentials and gain access to your system or data.
An automatic full disk encryption security application that transparently protects your data against malware, theft and accidental data loss by continuously validating your identity, application and device using Windows BitLocker and Mac FileVault.without disruption to your workflow. Your data stays encrypted even with it’s shared or uploaded to a cloud-based, file-sharing system.
A cross-platform security solution featuring antivirus, client firewall, Network Access Control and data encryption visible in one simplified, cloud-based console.
A free HIPAA, PCI-DSS and NSA-certified device shredding service for all electronic media, including: hard drives, SSDs, thumb drives and cell phones. Any devices, components or electronic media containing confidential Level 1 or Level 2 data must be destroyed by an approved data destruction process.