Thank you for Subscribing to Apac CIO Outlook Weekly Brief
Augmented Technology: Keeping your Corporate Information Secured
A well-known facet of technology is that it keeps updating itself at an unprecedented pace at regular intervals. However, the data security compliance scope is unable to incorporate the rapidly changing technologies through time. Amidst the evolving landscape, the scope of conventional compliance remains stagnant. Understanding this loophole and hence working to further enhance the compliance space is Augmented Technology - a Malaysia-based company providing quality solutions to develop superior IT Security Services to Government and Organisations.
Augmented Technology or known as AugTech with its services such as Financial PKI, Government PKI, and Research and Development is stirring the compliance market. While Financial PKI focuses on high-speed cryptographic processing across different industries ensuring efficient flow of money - Government PKI services concentrate on the multiple level security control for various categories of data and system. Razak Jalil, CEO at Augmented Technology elaborates, “Government data may have a catastrophic effect on the country, and hence we provide the highest security controls be it cryptographic algorithm or processes to handle Government data and information.”
In recognizing the importance of PKI, AugTech developed Managed PKI Client that provides a standard in cross platform, cross browser cryptographic API for any technical runtime on application that requires integration with PKI USB token, roaming key, soft keystore, and mobile based PKI. Managed PKI Client is a self-contained runtime, web services API that allows Java, DotNet, C, C++ or any other runtime that supports web services.
The primary goal of Augmented technology is to bring in security amidst the changing compliance trends
It also provides auto update and up-to-date security patches in a single solution which will ease integration of PKI into any application. It is currently used for Courts and Central Bank.
Similarly, GPKI is a comprehensive PKI Life Cycle solution within a centralized portal that includes end-to-end key management through multi-channel access. It complies to international standard and e-Government crypto-algorithm across multiple government agencies and applications. GPKI support multi-layer user governance, multi-factor authentication, and open integration framework across multiple platforms. The Digital Timestamping services enhance time-sensitive requirements and administration.
The company also offers products such as HiPerSVS and Sentinel DIPS to increase the degree of accessibility, security, and manageability. HiPerSVS liberalizes the dependence on HSM (Hardware Security Module) and helps overcome the limitations faced during the operation of HSM. On the other hand, Sentinel DIPS is meant to provide security for the database from the driver itself. It is a combination of JDBC driver and backend services to allow access to the system admin. Sentinel DIPS with its unique proposition acts as a database firewall that keeps data safe and secured.
Team-AugTech also strives to keep PDFs safe and secure by bringing in solutions like SECURE PDF and SECURE ePIN. The main aim of Secure PDF is to bring the digital document closer to the physical document. While SECURE ePIN is an extension of Secure PDF that generates a PIN at the backend system. It is also called the single factor authentication and ensures the safety of PDFs in the internet world. Adding to this, Jalil says, “What we do is that we convert the PIN into a human readable format (CAPTCHA) and embed the CAPTCHA into a PDF file, then this PDF file is encrypted by a password. Thus, ensuring that information is safe, and not everyone can get access to the PDF.”
Looking forward, AugTech plans to enhance user experiences in trending technology landscape such as the mobile devices, the cloud, IoT, and more. They are currently collaborating with a university in research field in post-quantum algorithm design, standardization process of post quantum algorithms in the complexity of quantum computing secured communication.