CC Otwarte Systemy Komputerowe Sp. z o.o. - CC Open Computer Systems Ltd. is a privately owned limited company based in Warsaw, Poland.
CC is a software house and IT services company - providing secure IT solutions to Enterprises. We are an independent software vendor and system integrator.
We specialize in software development and system security, our main target markets are: banking and finance, government & non-profit, Telco & SP.
21.12.2024
31/10/2008 |
Simulator of the nuclear reactor "MARIA" "CC Otwarte Systemy Komputerowe" has developed a computer simulator of the nuclear reactor "MARIA". The project beneficiaries are: the Institute of Atomic Energy (IEA) Central Laboratory for Radiological Protection (CLOR). The simulator system was implemented in the period of July-October 2008 and was financed by the EU programme "Transition Facility 2005/017-488.03.06 Nuclear Safety and Radiological Protection ". Because of the forthcomming perspective of reactivation of the nuclear energy programme in Poland the training of future personel becomes an important issue. The major purpose of the developed computer simulator is to support trainings organized by IEA and CLOR. More info (in Polish). |
23/10/2008 |
TheGreenBow products added to our offer TheGreenBow has built a range of enterprise security software for the desktop and laptop to secure access and communications. TheGreenBow's strong security portfolio includes IPSec VPN Client software, Email & File Encryption and Central Policy Server. TheGreenBow Security products are designed to integrate smoothly with existing Antivirus or Antispam and support several kinds of USB Token. All products can be centrally managed. Our enterprise security software can be packaged with a USB flash drive and shipped worldwide. TheGreenBow security products are also known to be extremely easy to use. TheGreenbow is a privately owned company and was founded in 1998. |
04/09/2008 |
Tufin - new vendor in our offer Tufin Tufin specializes in Security Lifecycle Management, a category of software solutions that enable organizations to effectively implement their security objectives. Security lifecycle management solutions utilize a combination of business process automation and sophisticated analysis and simulation algorithms to help organizations cost-effectively manage security risks and ensure compliance with corporate and regulatory standards.
Tufin is headquartered in Ramat Gan, Israel, with offices in the US, Central Europe, UK, France and Benelux. The company's management team is led by security experts with backgrounds in network security and research and development. |
07/08/2008 |
We introduce Aruba Networks Aruba securely delivers the enterprise network to users, wherever they work or roam, with unified mobility networks that significantly expand the reach of traditional port-centric networks. Unified mobility networks integrate adaptive WLANs, identity-based security, and application continuity services into a cohesive, high-performance system that can be easily deployed as an overlay on top of existing network infrastructure. Adaptive WLANs deliver high-performance, follow-me connectivity so users are always within reach of mission-critical information. Identity-based security associates access policies with users, not ports, to enable follow-me security that is enforced regardless of access method or location. Application continuity services enable follow-me applications that can be seamlessly accessed across WLAN and cellular networks. The cost, convenience, and security benefits of unified mobility networks are fundamentally changing how and where we work. Listed on the NASDAQ and Russell 2000R Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions. |
16/06/2008 |
CC becomes Gold Partner of Secure Computing Corporation Secure Computing provides Internet security appliances and software solutions that proactively protect businesses against email and Web threats like viruses, spam, malware and network intrusion, as well as regulations / compliance risks. |