Click here for our home page Click here to find out about us Click here for products & services Click here for support Click here for news Click here for details of our partners Click here for our contact details
CyberSafe logo

CyberSafe Limited • The Kerberos Solution Provider

Strategic Partners

 

Some of the strategic partnerships with other vendors, or solution providers are listed below :

 

 
News Highlights

 

 

TrustBroker Security Solutions, for SAP® R/3 and NetWeaver® - Extending your existing investment in Microsoft Active Directory and improving SAP® Application Security. Utilising centralised user password policy management, and common authentication. Providing Integrated Windows Authentication and Secure Single SignOn (Secure SSO) when users logon to SAP® Application Servers. Read more...

 

The SAP Enterprise Portal Integration provided by the TrustBroker Adapter product is featured on SAP SDN, in the Portal Content Portfolio Catalog. Please visit the catalog here, then use the search dialog to search for CyberSafe.

 

Working with Turnkey Consulting Limited - CyberSafe is now working with Turnkey Consulting Limited, who provide high quality security consulting services to SAP customers (located in the United Kingdom, and Europe). So, if you need help with SAP security, and want to use a consulting company to help you, please contact Turnkey Consulting to discuss your requirements. When your requirements relate to SAP security, especially to single sign-on, authentication and identity management Turnkey Consulting are now able to consider recommending CyberSafe TrustBroker™ products to improve your SAP security. You can visit the Turnkey Consulting site here...

 

For a complete summary of our latest, as well as archived News and Information, please select News in the menu.

 

 

 
What do we do ?

 

 
Why CyberSafe ?

 

We are a security software vendor, providing a wide range of solutions to address your security needs, especially related to the following :

  • Allowing you to fully exploit the many strategic benefits that the Kerberos security protocol brings to your business applications and network.
  • Improving the security of your applications, and your users access to them. You can use one common, secure, centrally managed and scalable authentication solution across your multiple operating systems, applications and environments and no longer have to suffer the consequences of users sharing their passwords, passwords being stored inside code or scripts, or being transmitted across your network.
  • You can use multiple forms of authentication, such as username/password, token card and smart cards without having to change the way your applications recognise a user's identity if the form of authentication differs.
  • Have a common strategic solution for application security in a distributed environment, where your applications are hosted on multiple operating systems, use products from multiple vendors and comprise a client/server or multi-tier architecture.
  • Allow you to get one step closer to achieving Single Sign On, but securely ... Your users will have a reduced number of passwords to remember and therefore less chance of them being forgotten or written down for others to see !
  • Take full advantage of your Microsoft Active Directory deployment on your network. You can take advantage of an existing authentication of users to the Microsoft domain to secure your business applications, regardless of the operating system they are deployed on, or the application vendor, or architecture involved.

We also recognise that your applications and networks are critical to the operation of your business, so we provide a quality support service with each solution.

We have been working with the Kerberos protocol and associated standards, and developing and supporting customers using products based on these standards since 1991 - when the original CyberSafe company was founded. We have a considerable amount of experience, especially related to best practices for appropriate use of the protocol in an application security and secure network deployment.

 

Our products, since the first release in 1991 have become highly regarded in the security industry as the most stable and feature rich commercially available, cross platform implementation of Kerberos. Our security solutions are based on this solid protocol implementation, and/or make use of (if appropriate) the implementations of Kerberos available from operating system vendors such as Microsoft.

 

We are actively working on many projects where Kerberos is becoming a key requirement in future security initiatives, and our current solutions are constantly being enhanced and updated to meet the future needs of our customers. Read more...