Would the disclosure of the identity of your customers put you or your clients in trouble? Would your customers leave you, use less your services or not to renew their subscription, etc.., if it was known they were using your services?
However, the traces that people leave on Internet and particularly among telecom operators are sufficient to identify them, potentially on a large scale (a telecom operator can exhibit all its clients using your website over a period generally ranging up to 3 years). If this is a problem for you, the TrustComs solution is a must-have, bringing you a centralized protection at your website level to guarantee the confidentiality of the communications with your users.
A centralized and efficient protection.
The Confidentiality Gateway is the first solution on the market to allow a centralized protection, at the website level, of the confidentiality of Internet connections. As an appliance or a web service (Software As A Service - SAAS), it is built around three pillars:
- A 100% secured platform taking into account your specific business and regulatory environment.
- A solution simple and transparent for your customers, independent from their terminal (PC, smartphone, tablet...).
- A solution fast to implement which does not require any change in your web platform.
For more information, thank you to contact us by email or phone, or leave your details and we will call you back.
What threatens confidentiality?
Telecom operators (ISPs, mobile operators...) are able to list your clients who connect to your web site or service. Indeed, in almost all countries, these operators are obliged to keep the history of their subscribers' Internet connections: who, which visited websites, when, how long, amount of data exchanged...
The operator sees and records each request of your users, even if your site or service is protected by encryption (with 'https' or equivalent): encryption hides the content of a communication but not the communication itself. Who connects to your confidential service (and gets logged by operators), if not precisely the ones for which you want to protect the identity?
These records, considered by operators as an administrative burden without strategic value, are poorly protected and easily accessible by the internal staff of the operator and by the numerous consultants who work there. Leakage risks are real as evidenced by regular cases.