Introducing ThinC

The most secure USB devices with biometric authentication and multiple functionalities.

Securing and protecting your data is our utmost priority. The ThinC compact Secure USB device variants are loaded with the most advanced security features – unique biometric authentication, multi-user access, encrypted storage and remote access from an isolated & clean OS/computing machine. The devices are also FIDO/U2F compliant-privacy by design.

amazon-logo_black

POWERFUL FEATURES

On-board Biometric Authentication (Supports upto 5 Biometric registrations)

AES-256 Hardware Encryption (Build-Your-Own-Trust for Enterprises)

Device Locking to PC/Laptop or Network (Protection from vulnerable users)

Supports multiple Storage Partitions (Individual & Shared Partitions with read-only/read/write permissions)

Designed in compliance with FIPS140-2 level 2 standards

FIDO2/U2F compliant (privacy by design)

The Range of NextGen ThinC Devices

ThinC-FIDO2/U2F

In this FIDO complaint USB device your fingerprint becomes the password.As the authentications happens only on the USB, no hacker will ever get to the finger print template.

ThinC COMPUTE

Boots from organization ported sanitized OS from a read-only partition. Customized Kernel & Device Drivers to establish hardened secure network connectivity with enterprise servers

ThinC-VAULT

Supports multiple storage partitions and accessible only on successful biometric authentication. User can set a PIN for additional protection. Also supports custom file system for enterprises.

ThinC CRYPTO-WALLET

A hybrid Crypto-Wallet supports Hot & Cold crypto transactions. Supports multiple crypto currencies and multi signature transactions. Prevents malware /ransomware attacks.

What makes ThinC devices fully secure?

  • Invasive and evasive anti-tamper mechanism
  • Build-Your-Own-Trust for enterprises
  • Addresses multiple security risks
  • Device can be locked to specific PC systems or to a network
  • Enterprises can maintain user logs and even deactivate a device remotely from a most convenient admin console
  • Unique IDENTITY with advanced CRYPTOLOGY techniques creates an ISOLATED, CLEAN & SECURE computing environment
  • Best solution for GDPR Compliance

USE CASES

Techstory Techstory Techstory
Inc42 Inc42 Inc42
New Indian Express New Indian Express New Indian Express
Deccan Herald Deccan Herald Deccan Herald
BW Disrupt BW Disrupt BW Disrupt
Your Story Your Story Your Story
Your Story TechinAsia TechinAsia
Your Story Yahoo! News Yahoo! News
Your Story Office Chai Office Chai
Your Story VCCircle VCCircle
Your Story iamwire iamwire
Your Story Digifire Digifire

USE CASES

Work from Home

When enterprises require employees to work from home by remotely connecting to their servers and networks using sanitized operating systems.

USE CASES

Bring Your Own Device (BYOD)

When enterprises allow the employees to bring their own devices to work. Usually personal PC/Laptops are infected due to the nature of internet browsing habits. ThinC-Compute sets aside the personal hard drive and loads the read only sanitized OS thus utilizing the compute power of the PC yet through a sanitized environment.

USE CASES

Remote Vendor Access

Manage remote vendor access using sanitized OS and registered vendors only.

USE CASES

Restrict Malware Propogation

Whereever copy/duplication from a read only storage is required, ThinC-Compute can effectively protect against malware propagation. For write access, limited protection is offered as referred in the scenario table above.

USE CASES

Remote Data Admin

Allow remote administration using sanitized OS packed with advanced admin tools required for remote support.

USE CASES

Hidden Partition

ThinC-Compute can host a hidden partition to store persistent data like configuration files and any user downloaded resources. This partition is accessed only using a custom tool and is not recognized by the OS or other programs.

USE CASES

Address Ransomware

ThinC is the only solution to rightly address the ransomware attacks as the contents cannot be encrypted or written on to. Backups and anti-viruses cannot really help which has been proven with many ransomware attacks including WannaCry.

USE CASES

Restrict Viruses

Malware cannot be installed on the read-only operating system. It may run temporarily but when rebooted will be wiped off. With appropriate server binding, firewall configuration, VPN access and network configuration, one can limit the sources of malware and viruses.

USE CASES

FIDO No More Passwords

With the specification of FIDO, passwords and any identity information is not required to be transmitted over the networks and stored at a centralized server. ThinC’s biometric authentication can quickly gain access to the server applications with a fingerprint scan.

USE CASES

ATM Software Distribution

ThinC-Vault's read-only storage partition allows bank executives to push software updates and drivers to the ATMs completely preventing malware propagation as the device is read-only.

USE CASES

Share Code Resources

Share critical code and resources among or across development teams.

USE CASES

Protect Confidential Data

Shared partition for multiple users to access the same partition with independent biometric access.

RESOURCES

SAFE DEVICE

The ThinC can be locked to a port or a network. It prevents people from using the device onto multiple networks and laptops and thus minimizes the risk of data leakage and malware infecting the machine.

BLOGS

IN THE NEWS

Download ThinC Tools

Download User Guides: ThinC VaultThinC FIDO2

CONTACT

# 1355-H&I, Niharika Jubilee One,
4th Floor Road No. 1 & 45 Cross, Jubilee Hills,
Hyderabad – 500 033, Telangana, India
Phone: +91 (40) 2355 4033
Fax: +91 (40) 2355 4034

thinc@ensurity.com

Schedule a Demo

 

Verification

Schedule a Demo

 

Verification

×