Contact Us |Site Map

Home » Product Directory » SUNPROTECTED TECHNOLOGY CORP.

Member Since 2017-12
SUNPROTECTED TECHNOLOGY CORP.
Total 32 products in SUNPROTECTED TECHNOLOGY CORP.
Show: 30 items
iOS Smart Card Reader

iOS Smart Card Reader 2016-12-28 06:16:28

iOS smart card reader is a storage device that support data transfer ability for cross-platform between Windows and iOS. In the past, the smart card readers were only used on computes. also ap ...

iOS Mobile Security

iOS Mobile Security 2016-12-28 06:19:19

iOS Mobile Signature Key iOS Mobile Signature Key have hardware RSA 1024/2048bit algorism and meet the secure requirement of digital signature. It also support AES 256bit algorism for data en ...

iOS Fingerprint Authentication

iOS Fingerprint Authentication 2016-12-28 06:16:17

iOS Fingerprint Certification Key iOS Fingerprint Certification Key is an external storage device for iPhone iPad. The key built-in secure element and conforms the certification of FIPS 140-2 ...

iOS Fingerprint Security

iOS Fingerprint Security 2016-12-28 10:28:27

iOS & PC Fingerprint Encryption Key iOS & PC Fingerprint Encryption Key is a new generation of encryption key for cross-platform between Windows and iOS. Not only an iOS OTG disk bu ...

Wearable Devices Security

Wearable Devices Security 2016-12-28 06:16:01

Wearable devices such as smartwatchs or fitness trackers allow people record their body's information such as pace, blood pressure, heart rate or locations in daily life. These devices make people ...

Smart Home Security

Smart Home Security 2016-12-28 06:15:48

Smart home application allows people remote control the equipment of home such as lights, door locks, air conditions, refrigerators or IP cameras through the smartphone and internet. It seems like ...

Robot Security

Robot Security 2016-12-28 06:15:55

Robots have become an indispensable part of automated production because of the rise of IoT. More and more manufacturing industries use robots to replace people for producing. The automated produc ...

Healthcare Security

Healthcare Security 2016-12-28 06:15:42

As the development of Internet of Things (IoT), Telecare service has been implemented in our life. Telecare service can transmit the real-time status of people who need healthcare. Through the inf ...

POS System Security

POS System Security 2016-12-28 06:15:30

Point of Sales (POS) Security The information security event of POS system attacking is not uncommon. Hackers steal customers' personal info or credit card information through invading the syst ...

mPOS Security

mPOS Security 2016-12-28 06:14:49

Mobile POS Security The development of mobile device has promoted the birth of mPOS (mobile Point-of-Sale). POS can be used on mobile devices such as smart phones and tablets. Most POS system w ...

POS Security

POS Security 2016-12-28 06:14:42

Medical POS Security POS system of Mobile Nurse Station allows doctors and nurses can connect the database of hospital's server via wireless to acquire the patient records anytime anywhere. And ...

Industry 4.0

Industry 4.0 2016-12-28 10:27:26

As the development of Internet of Things (IoT), POS system must be more powerful, more connected, smarter and richer to suit Industry 4.0. In the process of manufacturing, the supply chain, produc ...

Personal Authentication

Personal Authentication 2016-12-28 06:14:08

Identity Authentication From social software (ex. Facebook and Twitter) to search engines (ex. Google and Yahoo), from online shopping (ex. Amazon and Taobao) to cloud storage (ex. Dropbox, Goo ...

Personal Information Security

Personal Information Security 2016-12-28 10:08:59

Identifying Information Protection As the expansion of the scope of informatization, whether in our work or daily life we usually store our personal information such as name, birthday, job or ...

Asset Security

Asset Security 2016-12-28 06:14:22

Device Management & Control Whether in our work or daily life, desktops, laptops, smart phones or tablets are indispensable tool. Most business confidential documents or personal privacy ar ...

Personal Data Protection

Personal Data Protection 2016-12-28 06:13:41

No matter the data store in computers, smart phones or cloud, there are always many security vulnerabilities. If you store your privacy in these places, there is risk to be stolen. Only rely on an ...

Mobile Signature

Mobile Signature 2016-12-28 06:13:23

In the mobility age, limited by e-sign on desktops has been gradually inadequate. Because some managers who have signing authority will not always stay in front of desk, the signing process often ...

Secure Mobile Payments

Secure Mobile Payments 2016-12-28 06:13:17

Mobile Payment Mobile payment application allows smart phones become a payment tool. We don't need to always carry credit card or cash to make payment. The virtual payment tool makes life more ...

Mobile Banking Security

Mobile Banking Security 2016-12-28 06:13:10

Mobile Banking The mobile devices such as smart phones and tablet pc allows users log in online bank to check account, transfer and make payment, anytime anywhere. But, mobile devices are not a ...

Fingerprint Mobile Security

Fingerprint Mobile Security 2016-12-28 06:13:04

Biometrics refers to metrics related to human characteristics such as fingerprint, facial contour, voice or iris, etc. Through these characteristics to identify the people's identity. Most Apps of ...

Identity Authentication

Identity Authentication 2016-12-28 06:12:23

Through the establishment of Certification Authority (CA), we can strengthen the secure level for the E-Applications of enterprises or organizations such as E-Sign, E-Supply Chain, E-Consumption o ...

Enterprise Data Protection

Enterprise Data Protection 2016-12-28 06:12:40

The enterprises' confidential documents might be leakage due to different ways such as hackers or stolen by employees. For protecting the confidential documents, enterprises need a comprehensive i ...

Behavior Management

Behavior Management 2016-12-28 06:12:55

Behavior Management & Control Employees' unintentional negligence or malicious stealing might makes the confidential data loss or leakage. How to efficiently manage and control employees to ...

Asset Management Control

Asset Management Control 2016-12-28 06:12:08

Asset Management & Control In the age of informatization, IT asset (ex. system database and files, etc) and entity asset (ex. computers and communication equipment, etc) are the most import ...

Secure Mobility

Secure Mobility 2016-12-29 10:51:27

Mobile access from smartphones and tablets is the way work increasingly gets done for both corporations and criminals. Sensitive information, including cardholder data, usernames and passwords, pe ...

Privileged Management

Privileged Management 2016-12-29 10:51:16

Privileged Management solutions enable you to secure, control and audit privileged accounts by providing appropriate access through automated, policy-based workflows. The solutions cover the ent ...

Identity Access

Identity Access 2016-12-29 10:51:03

Identity & Access Keeping your network secure by ensuring that the right people and only the right people have access to just the right resources is the job of Identity and Access Managem ...

Data Protection Encryption

Data Protection Encryption 2016-12-29 10:50:51

Data Protection & Encryption Sensitive data is constantly at risk of loss, theft, and exposure. The rapid proliferation of mobile devices with large storage capacities and often internet ...

Secure Communication

Secure Communication 2016-12-28 06:10:27

In the wake of coming out of smart phones, phone call is not the only way people communicate by cell phone. We also communicate by Apps, transmit voice and image through internet. Due to the commu ...

Personal Information Protection

Personal Information Protection 2016-12-28 06:10:20

Mobile Apps such as Facebook, WeChat or Youtube has become the most important life tools and information source for most people. Sometimes, these Apps pop up the message of authorization request w ...

1 2