subscribe: Daily Newsletter

 

Bullion IT rolls out Nexus solutions

0 comments

Nexus, the European provider of information security solutions, will expand its service offering to South Africa, under the umbrella of Bullion IT. 

Specialising in securing information from “birth to grave” and “inside and out” of the traditional IT boundaries and allowing communities to secure digital information on a borderless basis throughout the life of information, will set this company apart from its competitors.
“Our edge is that this is not a point solution but an integrated platform that makes available to clients an integrated solution,” says Clive Strover, CEO of Bullion IT.
Nexus has a long established heritage with a number of notable achievements including delivering the:
* First secure eBanking solution;
* First secure e-government solution;
* First trust mobile solution;
* Largest smartcard deployment; and
* Broadest integrated product set.
“With our mother company based in Sweden and offices throughout Europe and Asia Pacific, Nexus currently boasts approximately 5-million end-users. It gives us great pleasure to be selected to represent Nexus throughout South Africa and Africa,” adds Strover.
"Nexus provides an extensive set of solutions that covers the implementation of enterprise wide, (or extended community wide) secured access, applications and information. It provides this security using open standards to ensure interoperability with other solution sets. The security is based on a choice of strengths of digital identity and encryption capabilities. The deployments are based on the application of security policies defined and implemented independently from IT administration.”
The security extends beyond the boundaries of an organisation into the community that shares the use of the information and business processes that it secures. The implementations can often be implemented so transparently that the user is not aware of their existence.
Nexus also offers the first implementation of mobile digital identity management through extending the capabilities of mobile devices to act as secure mobile vaults to hold certificates.
The solutions are presented as two suites of products: Nexus Information Security Suite; and the Nexus Digital Identity Suite. They are integrated through the use of industry standards that share management components such as policy definition – where the rules on access rights and encryption needs are defined and managed – and vaults, where the digital IDs, certificates and passwords are held securely.
“One client that was keenly aware of the need to protect business intelligence held by its staff, particularly on laptop computers, is Rolls-Royce. What Rolls-Royce wanted was the ability to define a security policy enterprise-wide that determined the subset of a user’s information requiring encryption and to have the issues of key management, roll out and maintenance handled automatically reducing cost and complexity.”
The policy needed to be defined and managed by the IT security team rather by end users or IT administrators with deployment and usage being completely transparent.
After a formal in-depth trial to define and test potential implementations, Nexus introduced its Information Security suite of products that provided secure network log-on, password management and file and folder encryption on a common platform. By using the enterprise policy manager an exact image of Rolls-Royce’s security policy was implemented and distributed from the centre to all users without a visit to the desk.
Rolls-Royce has made Nexus a vital component of its IT strategy and is planning the migration of its total laptop estate of approximately 5 000 users. Its users will soon work within the defined policy, not their own, giving Rolls-Royce enterprise total management over sensitive data.
Nick Bleech, Rolls-Royce, global IT security director, concludes: “Nexus is a welcome and key component of our global information security strategy. Their flexible, modern and cost effective approach has not only enabled us to securely manage our laptop information but over time may be widened to cover information stored on all our networked devices.”