First, PCANY uses strong
encryption technology to transmit every information.
There are other ways to protect our customer's computers:
- End-to-end process of authentification by using challenge/response
method.
- Use of authentification key: Each host computer
can has its unique authentification key that distinctly
identify it so that they can cope with the case when
code and ID were leaked.
- Tray icon shows that host PC is being accessed.
- System managers can monitor every access and log
off.
Also, Koino PCANY introduced NACS that KOINO developed
as its own strong authentification system. Each time
customer accesses the host computer, it requires each
access to undergo three rounds of authentification
and confirmation with central server. Therefore, PCANY
homepage at http://pcany.net/ is only website from
which you can access to your computer. It is impossible
to access your computer from other methods.
|