Main |
 |
From Tactical to Practical. Enterprise grade
password management tokens with a U.S. Military
pedigree. Mandylion technology was matured under a
Department of Defense research program seeking
practical solutions to a modern warfighter's problem: password overload. The solution? An
uncannily simple, inexpensive keychain sized token
which aids in the generation and secure management
of any password based login record.
|
Latest News
Federal
Computer Week Review
Leading Federal and State IT Publication reviews
Mandylion’s next generation token and states its
“ready for enterprise deployment”
more info
Wall Street Journal Review
WSJ article provides overview of how corporations are coping
with password overload and favorably describes the Mandylion Token
as the hardware token solution.
more info
Military Information Technology Magazine
Respected Military Journal Reviews DoD program
which matured Mandylion token technology.
more info
Civilian Agencies Deploy
The Commerce Department’s National Weather Service,
Treasury’s Bureau of Alcohol, Tobacco, Firearms &
Explosives and the National Institutes of Health
Deploy tokens. more info
DoD Funds Development
Mandylion Labs technology was matured and showcased
as part of a 3 year Advance Concept Technology
Development and Demonstration Project funded by DoD
Advanced Systems and Concepts. more info
|
How Much Are Passwords Costing You? Forget
about the security aspects of passwords. For a
moment, focus on their costs to your organization.
That’s right, their direct and recurring costs to
your organization. Although they appear free,
passwords cost your organization a material portion
of its IT support budget. more info |
|
Technology
Features
Manages Up to 50 Login Records Simultaneously
Generates Cryptographically Strong Passwords
Complies with All DoD, Govt. & Industry Password
Security Policies
Manages Root and Group Passwords
Approved, Trusted Technology; Recoverable
Enterprise Grade - Pre-Configurable for User
Flexible Design
Multi-Layer, Defense-in-Depth Approach |
A Password Security Policy & Compliance Management
Tool
Sarbanes-Oxley Compliance? Gramm Leach Bliley? HIPAA? FACTA? FISMA?
Regulations now mandate reporting on controls that
safeguard the enterprise’s computing systems. Merely having a policy in place is no longer adequate.
Management and Governmental entities must now
certify that these policies and controls are also
operating effectively.
more info |
How Strong Are Your Passwords?
Security experts cite weak passwords
as one of the most critical security
threats to your infrastructure. But just
what is a strong password? Are their tools
that can help me audit and quantify my risk?
more info |
|
|