HOME ABOUT US INDUSTRIAL DIVISION MARKETS MAJOR SOLUTIONS PRODUCTS A-Z EVENTS PRESS
HOME

Copyright © Eyeonix 2015 - All Rights Reserved

Vourvachi 34 & Theofilopoulou 2

Megaro Philippos

Entrance from Theofilopoulou

11743 Athens, GREECE

T: +30 210 9240425

F: +30 210 9240445

E: info@eyeonix.com

CONTACT

END TO END ENCRYPTION


The Public Sector business area is aimed at clients in public administration, specifically at the federal and state level, plus the defense and international organisation sectors; the Business Sector offers flexible IT security solutions that are aligned with the requirements of companies in the private sector. 


Public Sector

Processes and IT infrastructures in public agencies place specific requirements on information security. The range of areas of use, from securing digital communication and protecting e-government applications (e.g. against cyber attacks and espionage) to secure official documentation such as electronic passports and the new personal ID card, require high quality customised IT security solutions. Another challenge is the necessary level of security, which is always very individual in character and, depending on the purpose, can vary from information ranked as non-classified to TOP SECRET. 


Eyeonix solutions offer guidance and advice to national and international public sector and defence customers, drawing on state-of-the-art products and services that can be combined as required, along with customised security solutions. These are attuned to the demands of modern administration, enabling the fulfilment of official tasks and corresponding with the high security requirements on the security of classified information. 


The special strength of the Public Sector lies in its years of experience in dealing with security requirements in public administration and in the range of products and services focused on these.  IT security solutions are designed, developed and implemented with specific attention paid to the special infrastructure, legal, organisational and personnel factors. This comprehensive approach has already been put to use in areas such as network infrastructure, authentication, client and platform security, secure internet use, De-Mail, e-government, accompanying sensitisation measures, portal security (e.g. ELSTER), public key infrastructures and cryptography plus in the implementation of IT security solutions in the area of critical infrastructures.


GSMK CryptoPhones are the only secure telephones in the market that come with full source code published for independent security assessments. They feature the strongest and most secure encryption algorithms available today as well as the longest key lengths available on the global market, thereby o­ffering true strategic security and peace of mind today and in the future.


iStorage is the world’s most secure, easy to use and affordable USB flash drive product range that employs PIN code access with military grade hardware encryption. It incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting to a port.

Related Markets

Related Products (A-Z)

Defense

GSMK Cryptophone  (400, 450, 500, Gi10, IP19 Sirrix GSMK Crypto Gateway, GSM Cryptophone IP for Satellite Links)

National Intelligence

Public Safety

iStorage Personal, USB Flash Drive, USB 3.0

Banking


Maritime