Login once during the Windows logon with your smart card, CD or USB stick and an optional password. The software abylon LOGON SSO Home will insert the passwords and user names of all further application automatically.
abylon READER 5.5 The encrypting with the software of abylonsoft is not an one-way. The free READER-Version verify, decrypt and unpack SME files. The functions are offered simply by the right mouse button of the File Explorer.
abylon LOGON 5.5 Protect your computer with abylon LOGON, the simple and flexible logon for Windows NT, 2000 or XP. You can register any certificate smartcard, an USB-Token or alternatively also an 'EC MoneyCard' (with chip) and 'Health Insurance Card'.
Description: Would it be nice if you should be able to logon only once to you operating system and all password-protected programs and services can use without entering the password again and again? The software abylon LOGON SSO Home offers this opportunity. During the Windows login a smart card, a USB stick or a CD / DVD can be use as key. An additional protection with a password is optional possible. After starting the desired software the passwords are entered automatically and the application starts like magic. Even while working, the software abylon LOGON SSO Home detect the password dialogues and insert the data. Besides the gain in comfort, the software also offers an enhanced protection through a high-grade encryption using the AES-(256 bit) or Blowfish algorithm (448 bit). In addition, the spying of your passwords for example by key logger is much more difficult. Do you have to leave the computer in the short term, you simply remove your "key" and the computer will be immediately blocked or logged. This prevents even during a short absence unwanted prying eyes and theft.
claviscom LOGON 7.0.4 Protect your computer with claviscomLOGON, the simple and flexible logon for Windows NT, 2000 or XP. You can register any certificate smartcard, an USB-Token or alternatively also
USB Token Checks Out PCs Returning to the Office With more corporate workers than ever working at home or in secondary locations at least part time, many enterprise security managers find themselves at a loss to control the security and integrity of the machines their users work on.