Century Software

Security Solutions

Century Software Security Briefing Century Software's security solutions safeguard your critical business and personal electronic communications with the strongest encryption technology allowed by the US Government. Based on the SSH, SSL and TLS protocols, Century's products contain strong encryption, cross-platform interoperability, and secure user authentication. These components, integrated into every Century security product, will keep your email, file transfers, and Web access private, safe, and secure.




Products

Century Software supplies secure solutions that allow our customers to safely connect to remote computers, send and receive secure email, surf the web in privacy, and move files between computers.


TinyTERM Enterprise

Secure mobile connectivity for iOS and Android


TinyTerm Plus for Windows

Secure Windows desktop IBM and UNIX connectivity for the enterprise


TinyTERM for Mac

Secure desktop connectivity for macOS


TinyTERM Plus for Web

Low-cost, centrally administrated, highly secure terminal emulation host access from any browser




How-To Guides and Overviews

Century's secure solutions are based on strong encryption and open standards, such as SSH. Our library of free white papers and technical papers discuss security technology, how Century applies it in our products, and how users benefit.

Port Forwarding Overview and How-To Guides




Resources

Private and corporate security has become a critically important technology. We've assembled a compilation of some of the best security resources found on the Internet.




Online Security Tests

Email AntiVirus and Security Testing Zone
http://www.gfi.com/emailsecuritytest/

Gibson Research Shields Up
https://grc.com/x/ne.dll?bh0bkyd2




Organizations

CERT Coordination Center
http://www.cert.org

Counterpane Internet Security
http://www.counterpane.com

Cryptome Archives
http://www.cryptome.org/

Electronic Privacy Information Center
http://www.epic.org

RSA Security
http://www.rsasecurity.com




US Government

BIS Commercial Encryption Export Controls - Regulations
http://www.bis.doc.gov/encryption/

U.S. Department of Commerce - Bureau of Industry and Security
http://www.bis.doc.gov/index.htm




Specifications

Internet Engineering Task Force
http://www.ietf.org

Internet Engineering Task Force - Secure Shell Protocol Architecture
http://www.ietf.org/rfc/rfc4251.txt




Magazines and Periodicals

CIO - Chief Information Officer
http://www.cio.com

CIO Insight
http://www.cioinsight.com

CSO - Chief Security Officer Magazine
http://www.csoonline.com

eWeek
http://www.eweek.com

Federal Computer Week
http://www.fcw.com

Information Week
http://informationweek.com

InfoWorld
http://www.infoworld.com

Intelligent Enterprise
http://www.intelligententerprise.com

Network Computing
http://www.networkcomputing.com/

Network World
http://www.networkworld.com/

SearchSecurity
http://searchsecurity.techtarget.com

Washington Technology
http://www.washingtontechnology.com