|
Authentication / VPN
Identity Management
Data security
Anti-cloning
Trusted Computing Platform
security (TPM technology)
Network / IT security
Enterprise applications
Smart Cards
Homeland Security
|
|
FIPS140-2, Common Criteria
(CC) solutions
PKI applications
Health Care / HIPAA
VoIP, Telecom
Secure hardware components
Product identification
Credit Card / Point of Sale
Banking and financial transactions
Embedded solutions
|
|
Network devices
GSM
Shipping / logistics
Digital Rights Management (DRM)
IP Protection
New licensing models
Biometrics
Government security
RFID security and implementation
Anti-tampering solutions |
|