Security & Compliance

WeSoft recognizes and understands the importance of properly securing your data and the systems on which your data reside. We help your organization function at its highest capacity while maintaining security and compliance.

 

 

Cloud Identity, Mobile and Management

Identity management improves end-user productivity and secures access to cloud, mobile, and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Manage apps, mobile devices and web portal via Active Directory, LDAP or cloud identity stores. Single Sign-on (SSO) for Cloud and mobile apps can provide a one click access to users’ cloud, mobile and on-premises apps. Forgotten passwords and user confusion will be eliminated. Our Identity Service provides turnkey SSO access to thousands of popular apps.

For IT administrators, they can manage employees’ access to all apps from single source – Active Directory, LDAP or cloud identity store. Automatically create accounts, manage access to those accounts and revoke access from all devices when necessary — all from a central control point. Company can leverage user’s mobile devices as a second factor for app authentication. SMS, email, voice or secure OTP – implement MFA without the hassle. Secure and manage the devices used to access cloud and mobile apps through fully-integrated mobile device and app management capabilities.

Cloud-based Password and Access Management

Security is enhanced when sharing privileged accounts, simplified compliance and secure remote access to on-premises and cloud-based infrastructure. Users can get control and access to privileged account password in emergency cases from their own mobile device enrolled in the Cloud. Secured password checkout requires a PIN validation. Check out automatically time out based on per-resource policy.

IT administrators can secure and manage super users and service accounts on servers and network devices, both on-premises and in the cloud. It will provide security for the modern enterprise where IT is increasingly outside the firewall with a secure cloud-based service that is faster to implement and delivers quicker ROI. The solution provides both remote and outsourced IT with secure cloud-based access to the specific servers and network equipment they manage, on premises and in the cloud.

IT administrators can consistently monitor privileged sessions, whether using shared accounts or user accounts with privilege elevation, for servers and network devices, both on-premises and cloud based. Corporates can establish accountability and streamline regulatory compliance through session auditing, video replay, search capabilities and comprehensive compliance reporting. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.

Identity Consolidation, Privilege Management and Audit

By combining comprehensive bridging of Linux and UNIX system to Active Directory with powerful privilege management and session monitoring across Windows, Linux and UNIX systems, security is enhanced, improved compliance and comprehensive reporting and auditing.
Linux, UNIX, Mac and devices with the same consistent identity management services deployed for Window systems are secured. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.

Privilege management secures mission-critical servers from identity-related insider risks and outsider attacks. It simplifies the implementation of a least privilege access model across Windows, Linux and UNIX systems, streamlines the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.

The solutions offer detailed monitoring and reporting of privileged sessions, which eliminates anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance.

Dynamically Segment and Isolate Cross-Platform Systems prevent unauthorized access to trusted computing resources and datas, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.

WeSoft is the sole distributor of Centrify Corporation products in Hong Kong and China region. By leveraging our experience and expertise in software development, we are able to fulfill user’s need in the best way. Centrify Corporation is a leading provider of security and compliance solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications. From the data center and into the cloud, more than 4,500 organizations, including 40 percent of the Fortune 50 and more than 60 Federal agencies, rely on Centrify’s identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements.