The Public Sector business area is aimed at clients in public administration, specifically
at the federal and state level, plus the defense and international organisation sectors;
the Business Sector offers flexible IT security solutions that are aligned with the
requirements of companies in the private sector.
Processes and IT infrastructures in public agencies place specific requirements on
information security. The range of areas of use, from securing digital communication
and protecting e-government applications (e.g. against cyber attacks and espionage)
to secure official documentation such as electronic passports and the new personal
ID card, require high quality customised IT security solutions. Another challenge
is the necessary level of security, which is always very individual in character
and, depending on the purpose, can vary from information ranked as non-classified
to TOP SECRET.
Eyeonix solutions offer guidance and advice to national and international public
sector and defence customers, drawing on state-of-the-art products and services that
can be combined as required, along with customised security solutions. These are
attuned to the demands of modern administration, enabling the fulfilment of official
tasks and corresponding with the high security requirements on the security of classified
The special strength of the Public Sector lies in its years of experience in dealing
with security requirements in public administration and in the range of products
and services focused on these. IT security solutions are designed, developed and
implemented with specific attention paid to the special infrastructure, legal, organisational
and personnel factors. This comprehensive approach has already been put to use in
areas such as network infrastructure, authentication, client and platform security,
secure internet use, De-Mail, e-government, accompanying sensitisation measures,
portal security (e.g. ELSTER), public key infrastructures and cryptography plus in
the implementation of IT security solutions in the area of critical infrastructures.
GSMK CryptoPhones are the only secure telephones in the market that come with full
source code published for independent security assessments. They feature the strongest
and most secure encryption algorithms available today as well as the longest key
lengths available on the global market, thereby offering true strategic security
and peace of mind today and in the future.
iStorage is the world’s most secure, easy to use and affordable USB flash drive product
range that employs PIN code access with military grade hardware encryption. It incorporates
a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board
keypad before connecting to a port.