How is Protexxs security architecture unique from other security products?
The Protexx approach is unique in that we create a “Tunnel within a Tunnel” which secures both the user and the device. • A user is provided with a client piece of software, which contains all the programming to establish the Protexx tunnel. This is a piece of software needs to be loaded on your computers to establish the tunnel. • The second piece of information a user receives is their own unique certificate and startup script. The tunnel encapsulates all of your IP packets in a secure communication path from the client to the server. The data headers, user names and passwords that would otherwise be open and vulnerable to outside attack are now hidden through strong encryption. The tunnel is established and authenticated by using the user’s certificate. • The user’s IP address is also hidden. This prevents tracking of the user on the Network.