MY Security

Achieve Compliance and Peace of Mind with Strong 2 Factor Authentication

Data privacy is noted by CIO’s as the single biggest reason for not adopting cloud and mobile solutions. My Security used in conjunction with My Documents will provide the security and forensics to ensure your company knows exactly what is happening with your data. My Security can be purchased as a stand alone system (same new technology being introduced into Credit Card security today) or with any of RST Technology’s collaborative solutions.

RST Technology has developed a proprietary solution using 2-Factor Authentication with SSL Virtual Private Network Tunneling to create an easy to deploy Token-less (an industry first) above military grade security solution. Click here for more information on our new Invisible Cloud Token Technology.  There are simply no collaboration vendors today, other than RST Technology, who can deliver this level of security.  Industries that handle patient information, customer financial information, confidential HR information and highly sensitive intellectual property cannot accept anything less than above military-grade security.

RST Technology’s security solutions are ideal for any organization that must meet high Federal regulatory standards (such as HIPAA, SOX and GLBA) regarding data privacy and documentation.

 Below are highlights of MY Security unique functionality:

  • SSL/VPN along with 2-Factor Authentication utilizes 2 forms of unique identification (an Individuals password and a unique One-Time Password) during the sign-in process to insure users are who they claim to be.
  • One-Time Passwords can be sent via Mobile Text, email Notification and e-Token apps for all SmartPhones and Tablets.
  • Invisible Cloud Token – Token-less One-Time Passwords provides the additional advantage for customers using RST Technology’s VPN by turning each device’s browser into a Token thus eliminating the need to carry a physical token and re-key the One-Time Password each time. Thus, gaining ease of use without sacrificing security.  There is an added cost per user for Invisible Cloud Token, however, it is about half the cost of a typical physical token implementation.
  • SSL VPN Tunneling utilizes proprietary algorithms to establish an AES encrypted network link providing true entry-to-exit security.
  • Access Rules by individual users to minimizes rogue employee mal-use.
  • System Diagnostics to monitor what applications and release levels are on each device to ensure compliance each time a transmission is established.
  • Unique Digital Certificate is assigned to each company account.
  • Active Directory or LDAP Link that allows for automatic bulk registration.
  • Forensic Monitoring to capture real-time transmission data (who, what and when) and provides security audits and logs.