{"id":15623,"date":"2018-12-03T11:42:51","date_gmt":"2018-12-03T11:42:51","guid":{"rendered":"http:\/\/payampardaz.com\/en\/?p=15623"},"modified":"2018-12-25T14:35:48","modified_gmt":"2018-12-25T14:35:48","slug":"keyhan","status":"publish","type":"post","link":"https:\/\/payampardaz.com\/en\/keyhan\/","title":{"rendered":"keyhan"},"content":{"rendered":"

\"\"<\/p>\n

Introduction to Keyhan<\/h2>\n

 <\/p>\n

Dear Iranian managers of governmental and private organizations,<\/p>\n

How much do you pay or attempt to keep your organization\u2019s fundamental information confidential?<\/p>\n

Have you ever taken necessary measures into account to make your computer networks extremely safe?<\/p>\n

Have you ever implement an easy but complete solution to gain remote access to servers within the organization?<\/p>\n

Today, information are supposed as main asset of individuals, companies and governments; so, it is predicted that in the near future, powers of government will be calculated on the basis of their information from individuals and organizations. It is clear that the value of organization information is greater than personal information. On the other hand, strategic situation and nature of Iran has always attracted the attention of strangers; so that the important Iranian companies, including oil companies are faced to the highest number of cyber-attacks (successful or unsuccessful). Now, the important question is that: in these circumstances, how much do our organization managers pay as or attempt to keep your organization\u2019s fundamental information confidential? Have they ever taken necessary measures into account to make their computer networks extremely safe? Have they implemented security standards such as ISO 27001 at their organization?<\/p>\n

Fortunately, in recent years, high-level managers have had more attention at the issue of securing their organization and computer networks insofar a strong improvement is observed at security level of organizations. But still, there are other unanswered questions. For example, aren\u2019t our organizations at risk anymore? Has statistics of successful influential and attacks to our organizations\u2019 computer networks decreased in recent years? How can we be sure that these solutions which provide security have necessary and sufficient efficiency? Don\u2019t products that are using for ensuring security, have covert channels to influence and extract our organizational information? And finally, can we generally trust in foreign supplier in the field of security?<\/p>\n

Payam Pardaz Co. with more than two decades of experience in the field of information security and connections as well as their local products\u2019 portfolio can help you, dear manager, so much to find above questions\u2019 answer. LAN-secure product of this company with KEYHAN brand name is the only domestic product which can completely cover applying two paragraphs of ISO 27001 security standard in your organization. This product with its local hardware security protocols, algorithms and Tokens can promote largely security level of your organization\u2019s computer network and with proper use of it you can be sure about impossibility of covert channels\u2019 utilization.<\/p>\n

The auxiliary role of Keyhan product to implement ISO 27001 security standard are as follow:<\/p>\n

Network access control
\nUsage policy of network service
\nUser authentication for external connections
\nSeparation of the networks
\nNetwork connection control
\nControlling the access to OS
\nUser identification and authentication
\nExpiration of session deadline
\nLimiting the time of connection
\nIsolating the remote sensitive systems
\nCorrect processing of applications
\nVerification of input data
\nMessage integrity<\/p>\n

 <\/p>\n

Keyhan properties and features<\/h2>\n

Today with the development of information technology, all large and small organizations with either LAN or WAN computer networks are all in a vast geographical area. The organization servers are usually located in the network center and applications on client computers receive necessary service from these servers. Alongside development of technology, threats and cyber-attacks become more widespread and some attacks such as access to data through network or stealing password and role playing may happen. Thus, providing security of electronic services has recently become one of the most important issues that IT managers of organization is facing.<\/p>\n

On the other hand, special-purpose attacks which was carried out recently against important sections of Iranian installations have led IT managers\u2019 attention to focus on provision of their organization\u2019s server security and sensitive data more than before.<\/p>\n

Keyhan which is a domestic system to make network safe provides obviously different security services such as users\u2019 two-factor authentication, access control, confidentiality and accuracy of transferred information, traffic analysis and high availability. Keyhan can significantly help to implement famous security standards such as ISO 27001 by its local hardware security protocols, algorithms and Tokens. This system contains a server (to apply in the entrance of organization\u2019s sensitive servers), client software (for users\u2019 computers), management software and hardware security tokens of users (with Keya brand name), it can be launched easily at organization network as well as utilize without the need for special training.<\/p>\n

\"\"<\/p>\n

<\/h4>\n

Applications<\/h4>\n