Security Solutions
Century Software's security solutions safeguard your critical business and personal electronic communications with the strongest encryption technology allowed by the US Government. Based on the SSH, SSL and TLS protocols, Century's products contain strong encryption, cross-platform interoperability, and secure user authentication. These components, integrated into every Century security product, will keep your email, file transfers, and Web access private, safe, and secure.
Products
Century Software supplies secure solutions that allow our customers to safely connect to remote computers, send and receive secure email, surf the web in privacy, and move files between computers.
Secure Windows desktop IBM and UNIX connectivity for the enterprise
Secure desktop connectivity for macOS
Low-cost, centrally administrated, highly secure terminal emulation host access from any browser
How-To Guides and Overviews
Century's secure solutions are based on strong encryption and open standards, such as SSH. Our library of free white papers and technical papers discuss security technology, how Century applies it in our products, and how users benefit.
Resources
Private and corporate security has become a critically important technology. We've assembled a compilation of some of the best security resources found on the Internet.
Online Security Tests
Email AntiVirus and Security Testing Zone
http://www.gfi.com/emailsecuritytest/
Gibson Research Shields Up
https://grc.com/x/ne.dll?bh0bkyd2
Organizations
CERT Coordination Center
http://www.cert.org
Counterpane Internet Security
http://www.counterpane.com
Cryptome Archives
http://www.cryptome.org/
Electronic Privacy Information Center
http://www.epic.org
RSA Security
http://www.rsasecurity.com
US Government
BIS Commercial Encryption Export Controls - Regulations
http://www.bis.doc.gov/encryption/
U.S. Department of Commerce - Bureau of Industry and Security
http://www.bis.doc.gov/index.htm
Specifications
Internet Engineering Task Force
http://www.ietf.org
Internet Engineering Task Force - Secure Shell Protocol Architecture
http://www.ietf.org/rfc/rfc4251.txt
Magazines and Periodicals
CIO - Chief Information Officer
http://www.cio.com
CIO Insight
http://www.cioinsight.com
CSO - Chief Security Officer Magazine
http://www.csoonline.com
eWeek
http://www.eweek.com
Federal Computer Week
http://www.fcw.com
Information Week
http://informationweek.com
InfoWorld
http://www.infoworld.com
Intelligent Enterprise
http://www.intelligententerprise.com
Network Computing
http://www.networkcomputing.com/
Network World
http://www.networkworld.com/
SearchSecurity
http://searchsecurity.techtarget.com
Washington Technology
http://www.washingtontechnology.com