Overview
![]() | |
![]() | |
![]() |
UNIX Host Run the Scan process, download the Scan file to a PC |
![]() | |
![]() |
Scan Files: sekunf.z or 25-30 text files (dependent on the availability of certain software on the host) |
![]() | |
![]() | Encrypt the extracted security data in SEKUNF.ZIP E-mail the encrypted files for processing |
![]() | |
![]() |
SekChek Premises Decrypt the SEKUNF.ZIP or SEKUNF.SCK file and produce your SekChek Report |
![]() | |
![]() |
E-mail your encrypted SekChek report package (SEKUNR.SDE) to you |
![]() | |
![]() | SekChek Report |
We provide you with:
- Detailed step-by-step instructions for all processes;
- Software to encrypt & decrypt the transmitted files.