Independence, MO (PressExposure) February 07, 2011 -- GoldKey Security Corporation has formed a strategic partnership with Microsoft® promoting Microsoft features with the added security of GoldKey tokens. GoldKey solutions will be demonstrated in the Microsoft Partner Pavilion at the RSA Conference in San Francisco, February 14-18, 2011. The technology will also be featured in the GoldKey booth, #2051.
"Our partnership with Microsoft will not only give GoldKey customers an added layer of security, it will insure they receive first class service and support, especially when integrating GoldKey with Windows 7, Microsoft Cloud, and Active Directory", says Jon Thomas, VP of Sales at GoldKey Security Corporation.
GoldKey is an integrated security solution that incorporates twelve security strategies into a single device making it the most comprehensive solution on the market. GoldKey provides an additional layer of security for Microsoft Cloud, Windows 7, and Active Directory users.
GoldKey Multi-Factor Authentication for Microsoft Cloud GoldKey can be leveraged as a secure multi-factor authentication device for many Microsoft® Cloud solutions. With native support in Windows® 7 and Microsoft Active Directory®, GoldKey allows you to take advantage of this progressive technology while ensuring only authorized key-holders will have access to your critical and confidential data.
Microsoft Windows 7 Lock with GoldKey GoldKey has been designed to seamlessly integrate with the advanced security features already built into the Windows® 7 operating system. Organizations can quickly improve protection for every computer, encrypt any disk, safeguard email, simplify logins, secure files, and more - all without purchasing any additional software or drivers.
GoldKey Multi-Factor Authentication for Active Directory Active Directory® is a powerful tool for network administrators allowing them to manage hundreds of computers and users in a central system. Maintaining the balance of usability and security is critical for administrators, but using only the classic user name and password method of authentication, companies and users are at serious risk of attacks.