Cyber Security

Comarch tPro Family


Comarch tPro Family is a collection of highly specialized tokens that has been developed in response to the growing need of data transfer protection. These devices deliver strong methods of authorization and authentication to protect against various cyber-attacks. Thanks to the fact that Comarch tPro tokens require human-machine interaction the transfers are secure from keylogging and frauds using remote desktop access.

 

Read More Download Brochure

 

Comarch tPro Family is a set of hardware tokens that act like the electronic keys to access secured resource.

 

Comarch SecureAccess


Comarch SecureAccess manager provides a simple method of monitoring privileged users’ actions on servers. This tool enables full control over remote users’ permissions to servers, and at the same time, records their activity. Through logging into SecureAccess, the user gains the secure access to selected servers.

 

Read More Download Brochure

Comarch SecureAccess manager provides a simple method of monitoring privileged users’ actions on servers.

Comarch IAM - DRACO

 

Comarch IAM DRACO is an identity and access management tool that provides control over access to company’s or organization’s applications. This solution offers the best managing methods which comply with security standards. Thanks to DRACO you can grant access, authorize, authenticate and manage access to applications, devices and crucial data. Comarch DRACO can be easily adapted to any requirements of organizations of various structures and localizations.

 

Read More Download Brochure

Comarch DRACO provides world-class identification, authorization, authentication and managing methods and procedures in line with security standards and regulations.

Comarch Crypto Provider

 

Comarch Crypto Provider is a bridging solution that brings digital signatures to web applications. It enables communication with smart cards and cryptographic tokens without using technology unsupported by modern web browsers, such as NPAPI, Java Applet or browser extensions. Comarch Crypto Provider is multiplatform (Windows, Linux, macOS) and supports all major browsers (Chrome, Firefox, Edge, Safari, IE).

 

Read More 

Comarch Crypto Provider is a bridging solution that brings digital signatures to web applications.

Comarch Consulting

 

Comarch Cyber Security Professional Services offer wide range of auditing services, such as: penetration testing, security architecture analysis, security policy and procedure monitoring etc., executed by the team of highly qualified engineers. Our employees have wide experience in developing and implementing security policies that comply with international standards (COBIT, ITIL, TOGAF, MODAF, DoDAF, ISO/IEC 27001, PCI DSS, SABSA).

 

Read More Download Brochure

Auditing services performed by our engineers include, but are not limited to: penetration tests, security architecture analysis, security policy and procedure monitoring.

Comarch PKI

Comarch Public Key Infrastructure (PKI) Solution enables secure communication and data flow in any organization or business operating in the Internet era. In an organization that needs its data to be encrypted, a user who wants to sign documents electronically first needs to have an appropriate pair of keys. 

Read more

technologies/pki/

Comarch IoT Security

Comarch IoT Security Solution provides a proven solution for identity and access management challenge. Thanks to the integration of Public Key Infrastructure (PKI) and Identity & Access Management (IAM), the solution offers a high-security level for scalable IoT projects in all industries. Whenever users’ authentication, device authorization, mobile access or server- device communication is considered, Comarch IoT Security Solution is the best option. 

Read more

Comarch IoT Security Solution provides a proven solution for identity and access management challenge. Thanks to the integration of Public Key Infrastructure (PKI) ↗ and Identity & Access Management (IAM) ↗, the solution offers a high-security level for scalable IoT projects in all industries. Whenever users’ authentication, device authorization, mobile access or server- device communication is considered, Comarch IoT Security Solution is the best option.

Want to know more? Need some advice?

Tell us about your business needs