GoldKey Secure Web Finding Success in the Market

GoldKey Secure Web Finding Success in the Market

Dr. Roger Billings | Authentication, Data Encryption, Encryption, Identity Protection

GoldKey is now being used as a secure way to protect access to websites. Using the GoldKey core technology (patents pending), it is possible for a user with just one token to securely log in to millions of unrelated sites

GoldKey Receives PC Magazine Five Star Rating & Editors' Choice

GoldKey Receives PC Magazine Five Star Rating & Editors’ Choice

Dr. Roger Billings | Encryption, Identity Protection

PC Magazine has just issued GoldKey a Five Star rating and selected it as their Editors’ Choice. The coveted Five Star rating is rarely issued, and this is the first time that a security token has ever received this status.

Managing Multiple Computers in an Organization

Managing Multiple Computers in an Organization

Dr. Roger Billings | Authentication, Encryption

Many organizations have a large deployment of computer systems managed by a central support team. GoldKey Security tokens are a valuable tool to aid in the secure management of these major deployments.

Advanced Authentication for CJIS Compliance

Advanced Authentication for CJIS Compliance

Dr. Roger Billings | Authentication, Identity Protection

Advanced Authentication will soon be required of all law enforcement personnel accessing the CJIS information system. GoldKey is an excellent choice for agencies desiring to comply with the FBI regulations.

GoldKey SecurID Alternative

GoldKey SecurID Alternative

Dr. Roger Billings | Authentication, Cloud Security, Identity Protection

Authenticating a user on the network or over the Internet is one of the cornerstones of all security systems. In the realm of two factor authentication, there are three basic strategies that represent the majority of the market.