![]() ![]() It also handles Point-to-Point Tunneling (PPTP VPN) and Layer 2 Tunneling (L2TP) protocols. Shimo supports every major VPN protocol that is currently available: The widely used CiscoVPN, the very secure OpenVPN and all standard-compliant IPSec connections. VPN Protocols There are no limitations regarding the use of VPN protocols. If your connection requires certificates or one-time passcode tokens, such as RSA SecurID, our VPN client for Mac provides the necessary toolset through Extended Authentication (XAUTH). Likewise, passwords are often not sufficient to introduce security to a system. Additionally, secure cryptographic key exchange over insecure or public channels is enabled using the Diffie-Hellman (D-H) method. ![]() As a consequence, our hash algorithms include SHA-2, the latest set of cryptographic hash functions. But encryption is only as strong as its weakest link. Shimo provides encryption technology such as AES-256 which is even certified by governmental organizations, global enterprises and the military. We make no compromises when it comes to security standards. ![]() Your privacy and the security of your data is protected when using Shimo to establish network connections. Shimo is based on the latest security technology available. ![]() Highest Security Standards Cutting-edge technology ensures that your connections are secure and your data is safe. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |