|
| ||||||||||||||||||||||||||||
|
Dial Security and Remote ReBooting Innovative Data and Telephony Products Dial & LAN Security - Telephone Line Sharing - RS-232 - Remote Maintenance - ReBooting | ||||||||||||||||||||||||||||
|
Recently, we have introduced several new flavors of dial security and remote rebooting products. I thought this might be a good time to review them and clarify their functions and prices.
DIAL SECURITY PRODUCTS
Best liked features They are completely transparent to the caller. Other more costly systems require several frustrating minutes to sign-on to an overly complicated control unit without appreciably increasing the level of authentication. Multiply that by the number of sign-ons and you could be looking at a substantial loss of productivity as well as more irritable employees or customers. This initial frustration may also be compounded by the potential for dead batteries, loss of synchronization, forgotten passwords, transposition errors, etc., which are characteristics of other systems. Another notable feature is that unauthorized calls are never recognized as modem answered calls by war dialers. It's a pretty sinking feeling to see your unlisted modem numbers publicized with a hacker help message attached, but this is happening every day. The phone numbers are being picked up by war dialers or published by vindictive employees, ex-employees and competitors. Even if the perpetrators are not successful in penetrating your system, a denial of service attack may still be mounted by simply busying the identified modems for extended periods. The Challenger defeats these types of calls in less than ½ second. Some models also log these events along with the caller's ID. However, this may be a fortunate wakeup call if you become aware of it. The most devastating hacks are those that you are not aware of. Leaving open modems today is like playing Russian Roulette. The general customer reaction over time is that the Challenger products are economical and a deceptively easy to use while providing a high degree of authentication. CPS developed this unique concept about six years ago and with thousands of installations, no one has cracked the system or duplicated the concept. However, we have adapted it to fit the changing market conditions and customer requirements.
![]() Provides two levels of secure access
Challenger P2-BAS The P2 BAS can also be used in any application where secure access is restricted to different groups while allowing "executive level" access to all of the groups.
Most of the Challenger hardware is now field programmable. If a KEY is lost or someone leaves without returning their KEY, it can either be defeated or the remaining KEYs can be reprogrammed to render the missing KEY useless. The hardware is available in different models. The following chart provides a quick overview of the Challenger family of products.
Check out the latest on our Secure Remote Rebooting Products. | ||||||||||||||||||||||||||||
|
Computer Peripheral Systems, Inc. © Copyright 1996-2003 Computer Peripheral Systems, Inc. |