That's what our
customers tell us. The fact that security has not
been the problem it could be makes it that much
more important--you certainly don't want to make
headlines for being the first to have major
security problems. All ExtranetWorks solutions
have many levels of security, making it very
difficult to break into data from an
Key to ExtranetWorks
solutions is our ability to provide security at
Secure Socket Layers
Applications take advantage of SSLs at
application or procedure level, providing secure
encryption and authentication by trusted sources.
ID and Password for application access
Keep users out of the application
altogether with a security scheme that prevents
access to the executable. Login security can be
setup at different levels with different
capabilities based on user rights.
ID and Password for procedure / business process
Based on user levels, "doorways" can be
setup which allow access to only specific
procedures or business processes based on a
Destructible user directory so work is deleted
Whats left over when your user is done
working? Users can be dynamically assigned a data
directory that is immediately erased after they
log out of the system, eliminating tell-tale
information from the eyes of the most experienced
technology to prevent directory access to data
The application broker tracks security for all
users and ensures that all security requirements
are met before interaction with data is allowed.
Users do not communicate with databases directly.
All access is done through the application
Collaboration with firewall hardware and software
ExtranetWorks solutions always work in
collaboration with firewalls and standard
security measures to ensure your security
Secure encapsulation of business objects
containing data and presentation logic
ExtranetWorks s business object
technology (the bundling of data, business logic,
and application presentation) is always secure
through encryption, compression and
Encryption and compression of data and
Data and application encryption and compression
can be done on both the client and server.
User authentication is used to ensure that users
are who they say they are. This can be done at
numerous levels from cookies, to static IP
addresses, to login security.
Proprietary encryption of data caches on both
client and server
While data is waiting to be sent
from the server to client, or client to server,
caches of information can be secured through
encryption and also user passwords that make the
data impossible to read except for those that
have the keywords to unlock it.
Extensive logging capabilities
Depending on how much security you
need, logging can be done from simple IP address,
user ID and password, to logging every procedure
and action performed.
[ Press | Solutions | Support | Partners | Contact Us ]
Copyright 1998, ExtranetWorks
Corporation. All Rights Reserved.
9700 SW Capitol Hwy.,
Portland, Oregon U.S.A.
Phone: (503) 977-0200