Ceptor -

Ceptor:

Acceptor of user credentials.

Interceptor of unwanted traffic.

Receptor of user rights.

Why Ceptor?

Acceptor

Multiple Authentication Methods

When choosing Ceptor, your organization can meet all users with a login tailored to their needs while all required login methods can run simultaneously.

Ceptor – Acceptor of user credentials.

Interceptor

Only Accountable Traffic

The unwanted traffic is excluded while your users experience no noticeable overhead due to Ceptor Gateway’s unmatched performance.

Ceptor – Interceptor of unwanted traffic.

Receptor

Integrates with any server

Ceptor Agents enables deep security integration, session sharing and more. The Agents receives user information and provide it to the application server.

Ceptor – Receptor of user rights.

Single Sign-On

Ceptor provide multi domain enterprise Single Sign-On (SSO) and session sharing

  • With an increasing number of systems and applications follows an increasing number of username and passwords. That is why Ceptor offers enterprise SSO and session sharing across your entire application portfolio. SSO enhance your infrastructure with simplicity and improves user experience as the user is relieved of remember numerous login details.

  • Session sharing enables SSO across applications by only sharing the session key – any updates are immediately available to all applications, and usage of the shared session enables high security across all your applications by hiding individual server cookies within Ceptor’s session.

All Users

All Users

Ceptor is build to support all your users: customers, employees, partners and even your devices.

All Applications

All Applications

Ceptor integrates to your enterprise applications across any platform both on premise and in cloud.

All Devices

All Devices

Ceptor enables access for all devices: laptop, tablet, smartphone
and IoT devices.

What is Ceptor?

Ceptor is the new name for Asseco Denmark’s PortalProtect


  • Connector.

    Secure IT Infrastructure

    Ceptor is a secure IT infrastructure solution that can protect your applications, provide single sign-on and security for all your enterprise systems.

  • Connector.

    Configurable

    Ceptor can be configured for small single-server installations, and can scale to the largest enterprise installations with hundreds of applications and hundreds of thousands of concurrent users. All is proven technology, which every day protect some of the largest websites for some of the largest Danish enterprises.

  • Connector.

    Developed by Experts

    Ceptor is designed and developed by Asseco Denmark’s IT security experts together with the sharpest operations specialists. Our goal is to create the strongest security infrastructure possible with a minimum of performance limitations, whilst being simple to operate in even in the most complex environments.

  • Connector.

    Complexity Not a Problem

    The more complex your infrastructure and security needs are, the more Ceptor is of use to you. Ceptor is created to be extremely flexible, it is far more than just another security product; it is the secure IT infrastructure supporting very complex setups, multiple platforms and extreme large-scale application setups.

  • Connector.

    Performance Driven

    Ceptor is engineered from the ground up with high performance in mind without compromising security. Ceptor easily allows thousands of concurrent requests and is proven in complex high availability setups. You can from a single centrally managed installation run multiple separate clusters, thus separating e.g. intranet and internet sessions from each other if required for security policy or legal reasons.

Ceptor Configurations



Ceptor ensures a comprehensive security setup, whilst offering you the freedom to choose amongst Agents and Plugins that suit your business needs.

We know that it is important to stay on top of trends, especially within IT security. That is why we have made it easy for our customers to adapt to both external and internal influence. With Ceptor we support your existing setup and the setup of our future needs. It does not matter what your needs are – could be Single Sign-On (SSO), Multi-Factor Authentication, Biometric Access – we will make it work!

Ceptor Configurations

Need a complete and secure IT infrastructure?

For a more details

about Ceptor Configurations

Click to read more

What will Ceptor cost me?

Design your desired configuration to enable us to quote your Ceptor

 

What will Ceptor cost me?

Follow our step-by-step configurator to design your desired configuration to enable us to quote your Ceptor

Get Started

0$

Thank you, we will contact you soon

Choose a Product

Cepto Core is licensed including 1 Agent and 1 Plugin

You need to select an item to continue

Next Step

Choose Agent(s)

Ceptor Agents are a client towards the Ceptor Server enabling you to have deep integration with your application server

IBM WebSphere

Oracle WebLogic

Red Hat JBoss

Microsoft .NET


Jetty

GlassFish

Apache Tomcat

You need to select an item to continue

Next Step

Choose Plugin(s)

Ceptor supports virtually any kind of authentication. Multiple pluggable authentication methods can coexist, and the application can choose which ones to use

Single Sign-On (SSO)

OpenID Connect

Digital Signatures

OAuth & OAuth 2.0


Google Authenticator / TOTP

NemID

Kerberos

GeoIP


SMS OTP

WS-Security

X.509

FIDO U2F


RADIUS Server

You need to select an item to continue

Next Step

Amount of Users & Applications

Share with us a bit about your infrastructure

An estimate is fine

The expected amount of applications you need secured

You need to select an item to continue

Next Step

Final Details

Please fill out the form below to receive your quote:


Summary of your configuration

Description Information Quantity Price
Discount :
Total :

Request Quote

Get Quote
 

Contact us