Solutions
CG Trust Zero Trust_Device Authentication Solution

    CG Trust Zero Trust_Device Authentication SolutionNEW

    Exhibitor 
    Product Category
    Zero Trust Architecture
    Product Features
    率先通過資安院零信任第二階段
    防範帳密遭竊之非法設備連線
    Product Description

    Leading the nation! First to pass the National Institute of Cyber Security Zero Trust - Phase Two Device Authentication Certification!

    In the Zero Trust network architecture, no connecting device is automatically trusted. Devices must be equipped with a Trusted Platform Module (TPM) and undergo device authentication before establishing a network connection. Access to sensitive system information is only granted to devices that have successfully passed the device authentication process. Even if credentials are stolen, unauthorized devices cannot establish a connection unless they are on the device authentication whitelist. This effectively eliminates the possibility of illicit connections by non-authorized devices. Our system has been successfully implemented and meets the cybersecurity standards set by government-grade A-level security responsibility organizations.

    Browse other exhibited products by Changingtec.
    CG FIDO Solution
    FIDO
    CG FIDO Solution
    Profile tokenization Solution
    Data Masking
    Profile tokenization Solution
    Codesign Program Signing Solution
    Data Encryption
    Codesign Program Signing Solution