SEAcurIT-e Ltd
SEAcurIT-e > Applications


As a framework to support the use of cryptographic functions, SEAcurIT‑e® can be used as a foundation for building secure applications, or can be added to existing applications to enhance security and control.

In addition to Cloud and Internet of Things (IoT) applications, SEAcurIT‑e® is also beneficial to many other areas of application concerned with the protection of sensitive or critical data and services, such as end-to-end security, medical devices, the association of identities with keys, user and device authentication, and secure document exchange. A number of secure applications are included in the SEAcurIT‑e® portfolio.

Some specific applications include:

Encryption: ideally suited to encryption as security is ultimately dependent upon good key management, and successful deployments rely on the ability to control its use such as which information is protected and who can access it; encryption keys cannot be recovered by analysing the SEAcurIT‑e® parameters stored on the device.

Web Security: provides a cost effective means of protecting user information held by websites, without requiring the use of dedicated hardware; the user information may include password-related information, personally identifiable information, or payment card details; the use of SEAcurIT‑e® is completely transparent to site users.

Authentication: strong authentication utilising cryptographic methods relies on the protection and control of authentication keys. SEAcurIT‑e® is both a tool to strengthen the security of such authentication methods, or it can provide a complete solution itself. It supports multiple approaches, from the background and largely hidden use of authentication keys in applications using usernames and passwords, to where authentication keys must be available on more than one device, to overcoming vulnerabilities with weak passwords. Device specific, with multiple devices and accounts efficiently managed and controlled. Browser authentication is supported by a dedicated authentication scheme that counters real-time man-in-the-middle (phishing) attacks, or SEAcurIT‑e® can enhance other authentication mechanisms.

Enhanced password security: overcomes issues surrounding short, easy to guess passwords; ensures password check values cannot be used as a basis to compromise passwords.