TrustKey Security Keys
New G-series – now with Windows Hello.
Our new FIDO2 security key models with fingerprint, G310H and G320H, now also support the logon with Windows 10 Hello: Via fingerprint, Windows recognizes the user and allows him access to the user account or computer without any further interaction.
The new security key series is now available in our webshop.
Innovation at the Point of Sale
We would like to present the intelligent store shelf
The future belongs to interconnected products, but connectivity comes with significant risks
The Internet of Things surely offers great opportunities. Whether we are talking about network-attached refrigerators, intelligent lighting systems or automated water purification facilities, one thing is certain: no vendor or producer can afford to ignore this growing trend of (inter-)connectivity.
But the more ‘things’ communicate with each other, the more vulnerable they become to attacks from the outside. Conventional security systems are time-consuming and high-maintenance, not to mention the fact that they are also highly dependent on additional components that provide access to the network, a.k.a. gateways.
IoT security right from the factory floor – built-in encryption protects each product
Conscientious manufacturers anticipate potential threats and loopholes from day one. It is far easier and much more cost-effective to integrate security management into a product in advance rather than run behind sudden development milestones emerging from real-life attacks. The underlying concept is fairly straightforward: deploy a unique strong cryptographic key (stronger than any password) in every single device and you end up with ‘Security of Things’ rather than just ‘Internet of Things’.
Assume responsibility for the security of your customers’ data by incorporating security where it belongs – into the devices themselves rather than the gateways. That way you no longer have to build security around your product. You rather build your product around a ‘security core’ to make sure it ships with everything it will ever need in the field. If you should need to customise your solution after all, we can make that security core as individual as necessary based on your expectations and requirements.
Maintenance-free security with seamless integration
Even though internet-connected devices or products are already in use, it is still possible to establish data security at the source: security-enabled microcontrollers can be used as a modular upgrade to the existing system. We'll be happy to advise you on your project, however big it may be, and assist you with our extensive experience as IT system specialist.
Prize-winning: PointBlank receives the TeleTrusT Innovation Award 2017
Our research is excellent! The IT Security Association Germany (TeleTrusT) gives the TeleTrusT Innovation Award to PointBlank thus honouring our long-standing work. The decision shows: There is a high backlog demand when it comes to security for interconnected products.
“Now that we received this award we are proud to rank with big German research facilities like TÜV, the Hasso Plattner Institute and Frauenhofer Institute. It definitively paid off that we kept looking for better solutions time and again.”
Witali Bartsch, VP Security Solutions Steen Harbach AG