The REL-ID Platform
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

The REL-ID Platform

The REL-ID platform is a safe, simple, and scalable security platform that, for the first-time, tightly integrates your identity, authentication, and channel security.

Description

The REL-ID platform is a safe, simple, and scalable security platform that, for the first-time, tightly integrates your identity, authentication, and channel security. By combining strong "relationship" identities with our patented protocol, processes, and flows--- secure, continuously authenticated application channels can be established with blazing speed and at IoT scale. This powerful omnichannel technology enables a phenomenal user experience with every authorization and login while dramatically reducing your attack surface. Platform Capabilities: Strong Authentication Made Simple. Mutual, simultaneous, and continuous multi-factor authentication. All right within your own native app with the authenticator of your choice. Phenomenal User Experience. Built for the mobile-first world to deliver a simple, consistent, and phenomenal user experience that increases engagement. True Omnichannel Support. Provide customers a consistent and phenomenal experience across all channels - online, mobile, IVR, call center, chat, kiosk, and in-person. Channel Security. Connect over a whitelist based secure communication tunnel that is MITM proof and more secure than TLS. Without any of the operational complexity or cost. Secure Data-at-Rest. Encrypt data stored locally on the device using a key that doesn't exist until a fully verified and trusted context is established. For security better than Trusted Execution Environments. Device Trustworthiness. Use military-grade root/jailbreak/malware detection at consumer speed to block connections from vulnerable or compromised devices. Simple Integration. Our mobile SDK lets you add the right level of security to your mobile app, tuned to your needs and the risk profile. Customizable Policy Controls. Customize a comprehensive set of policy controls based on device, user and other context variables that allow you to meet your unique business needs and risk parameters.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company