View

Sorting

Products found: 28

logo
Offer a reference bonus
0.00

LastPass MFA

Leverage biometric and contextual factors to better protect your business while offering a passwordless user experience for employees.

LastPass MFA goes beyond standard two-factor authentication to ensure the right users are accessing the right data at the right time, without added complexity.

  • Adaptive authentication. LastPass MFA combines biometric and contextual intelligence to prove a user’s identity with a combination of factors.
  • Passwordless user experience. Authenticate users seamlessly across all their devices, with a passwordless experience that doesn’t disrupt their workflow or slow them down.
  • Secure every access point. From cloud to on-premise applications, VPN and workstation, LastPass MFA secures every access point to the business.
  • Customize for your business. Get ultimate flexibility with a variety of MFA methods that can be applied at the user or group level.

Thwart attackers, not IT

LastPass MFA offers an intuitive multifactor experience that’s easy for admins to deploy and effortless for employees to adopt.

  • Simple deployment. No additional training or services required. LastPass MFA delivers security quickly while saving time and resources.
  • Centralized, granular control. An extensive list of granular policies control user access at an individual, group, and organizational level.
  • Convenient integrations. Automate user provisioning with user directories like Microsoft AD and Microsoft Azure, with easy setup and minimal day-to-day management.
  • Security by design. Biometric data is encrypted at the device level and never leaves the user’s device, so biometric data remains private and secure.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
1
logo
Offer a reference bonus
0.00

Nok Nok S3 Authentication Suite

The Nok Nok S3 Authentication Suite enables FIDO certified multi-factor authentication (FIDO UAF, FIDO U2F, WebAuthn, and FIDO2) for mobile and web applications. Rather than the unpleasant experience of entering usernames and passwords, users can enjoy using the latest biometric authentication technology that already exists on their devices. Universal Authentication Server Nok Nok™ Authentication Server in conjunction with Nok Nok App SDK delivers delivers robust multi-factor authentication using the existing security features of a user's device (such as a fingerprint sensor) instead of a password. The Server supports emerging industry standards from the FIDO Alliance and provide organizations with a unified interface to incorporate strong authentication. Key features of the Authentication server:
  • Account Recovery
  • Auditing capabilities
  • Federation Support e.g. IBM SAM, PingFederate, ForgeRock
  • FIDO UAF, FIDO U2F, Web Authentication, and FIDO2 Protocol support
  • Industry compliance based implementation e.g. SOX, PSD2, HIPAA etc.
  • Multi-tenancy support
  • Out of Band Authentication Support
  • Policy Based Authentication
  • Reporting capabilities
  • REST API for easy integration into custom web applications
  • Web based administrative user interface
App SDK for Smart Watch The Nok Nok App SDK for Smart Watch allows customers to standardize on next-generation authentication across all digital channels - including smart watches. Smart watch apps can have a strong, device-bound credential that doesn’t need frequent renewal and server-side infrastructure can be standardized to support industry standards, including FIDO next-generation authentication - across all digital channels. Mobile Passport Application Passport from Nok Nok is an authentication app that supports the FIDO Universal Authentication Framework (UAF) protocol. Further, it also supports out-of-band authentication to authenticate to selected websites on a laptop or desktop computer. Gateway Nok Nok Gateway offering is designed to facilitate the ease of FIDO enablement of Mobile Apps and its integration to the Nok Nok Authentication Server. Key benefits of this offering include: Single API call from the Mobile App - to trigger registration, authentication and deregistration process; Easy enablement and handling of network communications/Session management with the Nok Nok Authentication Server.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
15
logo
Offer a reference bonus
0.00

Secret Double Octopus Authenticator App

The Octopus Authenticator offers a simple “touch-and-go” experience – users approve a secure push notification and provide a biometric identifier using the available sensor on their enrolled mobile device
  • Easy and fast user enrollment
  • Supports offline authentication
  • Built on proven Secret Sharing cryptography
  • Available on iOS and Android devices
Choose Your Authenticator
  • The Octopus Authenticator. The Octopus Authenticator app for the simplest user experience. Users validate their identity with a touch of their thumb or face ID, followed by a second biometric verification step.
  • FIDO2 Authenticators. Our certified FIDO2 server is fully compatible with any FIDO2 authenticators.
  • 3rd Party MFA. The Octopus Server is happy to connect with your existing MFA, our solution seamlessly integrate with Okta Verify and other leading MFA providers.
Web and On-Prem SSO Portal One authenticator enables your employees to easily and securely access all business systems and applications, on-premise or in the cloud. An SSO portal option provides employees with the added convenience of one access point.
  • Deploys on-premise or in the cloud
  • Multi-factor, high-assurance authentication
  • Integrates with existing business systems and applications
  • Passwordless, “touch-and-go” experience
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SecureAuth Identity Platform

Multi-factor authentication – Satisfy more use cases With nearly 30 multi-factor authentication methods ranging from mobile push notifications to desktop app generated OTPs to fingerprint and facial recognition biometrics, the SecureAuth Identity Platform adapts to preferences and provides maximum choice. Unlike many other solutions, the Identity Platform is flexible enough to create an infinite number of authentication workflows meeting unique needs for different users, groups, or applications – because all identities and risks are not created equally. Adaptive authentication – Secure access without compromise Delivering secure access starts with knowing more about the identities accessing your organization. The SecureAuth Identity Platform provides a broad set of unique adaptive authentication risk checks that analyze characteristics around device, location, IP address, and behavior to identify legitimate users and stop attackers. This layered approach to authentication security is invisible to users and only requires an MFA step if risk is present. Better security, better user experience without compromise Single sign-on (SSO) – Unify the user experience Deliver a seamless user experience across all your systems and applications — cloud, on-prem, legacy, homegrown. The SecureAuth Identity Platform supports a wide breadth of federation protocols and can even SSO-enable homegrown or legacy applications that present federation challenges. Offer users seamless access to your entire estate, regardless of where or what the system is. With multi-factor and adaptive authentication built right in, you can ensure low authentication disruptions and highly secure access for all your customer and workforce identities. User self-service – Increase engagement while lowering costs Now more than ever, users demand immediate results from digital experiences. To ensure maximum engagement from your customers and peak productivity from your workforce, user self-service options are a must. The SecureAuth Identity Platform enables 24 x 7 self-service for password resets, account unlocks, profile updates, and device enrollments to enhance the user experience while lowering your overhead. Reduce help desk calls up to 60%, freeing your staff and enabling a productive user experience. Hybrid, On-Prem, Cloud – Deliver secure access your way No other vendor gives you true deployment freedom without compromising capabilities or requiring you to bend your business to meet their solution. The SecureAuth Identity Platform is different. We offer options to deploy hybrid, on-prem, or in the cloud, whichever best meets your needs today and evolves with you in the future. The platform is built with open standards and offers a full set of APIs to enable easy integration into existing environments, leveraging your existing investments. Identity security your way. Simple administration – Make security complexity easy Identity management administration can be complex. The SecureAuth Identity Platform approach leverages reusable templates, policies, and settings to simplify and accelerate the creation and administration of access control and user experiences across a variety of systems. You can reduce administrative effort and time with a library of predefined application templates, reusable data store integrations, and adaptive authentication policies coupled with global MFA settings. Any modifications are made centrally and auto-propagated globally without further effort. Key Benefits
  • Strengthen security without user disruption. Based on your risk tolerance, the Identity Platform evaluates multiple contextual and risk factors only requiring additional authentication if risk is present.
  • Increase authentication choice & flexibility. With nearly 30 MFA methods supported, SecureAuth can meet both unique and common use cases while providing ultimate MFA choices for your users.
  • Deployment freedom. Gain the freedom to choose hybrid, on-prem, or cloud deployments, and the flexibility to evolve in the future, without compromising functionality.
  • Reduce IT burden & increase productivity. Self-service options decrease your reliance on IT help desk resources, lowering costs and improving user productivity with 24/7 availability.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SecurEnvoy SecureIdentity Platform

The SecureIdentity Platform allows organisations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time Features:
  • MFA. SecureIdentity multi-factor authentication (MFA) provides the security of user identity by verifying that a person is who they claim to be, utilising something the user knows (Password/PIN), something they have (Software/Hardware Token) and something they are (Biometric/ Facial Recognition).
  • IAM. SecureIdentity IAM enforces access decisions around applications and data repositories. Our solution enhances security by blocking systems such as Shadow IT and by enforcing strong data boundaries and separation of duties.
  • CASB. SecureIdentity CASB allows for a layer of security between your traditional on-premise infrastructure and your cloud based SaaS, PaaS and IaaS components.
  • IRAD. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risk s
  • PAM. SecureIdentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all.
  • DLP. SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud), which can prevent the loss of data from malware, insider threat and human error.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SendSafely Platform

SendSafely lets you easily exchange encrypted files and information with anyone on any device. Let us take the headache out of secure file exchange. The perfect balance of security and usability
  • Easy to Use. SendSafely works natively with all major browsers. No software to install, no encryption keys to manage.
  • Secure & Compliant. Use SendSafely for compliance with regulations like HIPAA (BAA available), GDPR, CCPA and more.
  • Integrated. Use one of our pre-built platform connectors or easily create your own integration with our developer API.
  • Enterprise Ready. Features designed for businesses such as user administration, single sign on and custom branding.
One platform, many uses SendSafely integrates with many popular third party systems, adding end-to-end encryption to the platforms your users already know and love. Extend the capabilities of your existing apps and infrastructure by seamlessly adding encryption to your existing workflows.
  • Secure Email. Pre-built integrations for Outlook and Gmail encrypt messages and attachments with the click of a button, or use our email gateway to automatically protect all outbound email.
  • Secure File Exchange. Our secure file exchange portal lets you send and receive very large files securely from anyone, and you can collaborate across teams using our Secure Workspace feature.
  • Help Desk Integrations. Secure your support workflow with native apps for Zendesk, Salesforce Service Cloud and Freshdesk. Our Dropzone also integrates with many popular help desk platforms.
  • SendSafely Dropzone. Securely collect files from any user on any device. Use our turn-key hosted version or embed the Drozpone on your own website. You can even integrate the Dropzone with your existing workflows.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Silverlake MasterSAM Star Gate

Managing cybersecurity has become the most challenging ever mission in today's fast-growing security landscape. Undeniably, insider threat has been growing tremendously looking at day-to-day reported data breaches around the world. It's a trend and it will continue to grow rapidly. Privilege is the main key to IT infrastructure. As such, managing privileged access has become a priority milestone to achieve in the most organization’s cybersecurity blueprint. User endpoints like desktop or laptop are always the main interest point among attackers, allows them to penetrate into the entire corporate network. A security layer is required to isolate the network between users and servers, eliminating the direct access through user endpoints to greatly reduce the risk of attack surface. MasterSAM Star Gate is designed to manage, secure and monitor privileged credential and access across the enterprise IT environment – either it’s on-premise data centre, on the cloud or hybrid infrastructure. This agent-less architecture enables organization to meet the compliance needs in a quick deployment model, supports wide coverage to systems/devices such as operating system, database, hypervisor, application, network and security devices. It offers built-in High Availability and Offline Secured Retrieval options to help organizations mitigating the risk of system access downtime, and ensure business impacts are minimized. Automated Password Management
  • Secured vault to store and manage privileged credentials according to complexity policy & flexible reset mechanism – automatically after use, manual or scheduled
  • Split password protection to ensure none can get to know the entire password during the password release cycle, satisfying the 4-eyes principle rule
  • Password verification & reconciliation to ensure managed passwords are always in-sync
  • Broad system support to to enterprise systems including server, database, application, security & network devices, and more…
Smart Surveillance Engine
  • Real time recording with screen capture technology for each privileged access activities in proprietary format
  • Smart mechanism to record based on user interactive activities, colour/grayscale recording
  • Tamper proof and real time transfer of recorded data to centralised log repository
Multi factor authentication
  • Provide extra layer of security authentication for each privileged access
  • Support multiple factor authentication such as AD, LDAP, RADIUS, username/password, SMS token, SMTP email token, built-in mobile apps token, integration with enterprise 2FA
Single sign-on & auto login
  • Centralised access point for administrators to connect to managed systems
  • ONE ID to remember
  • Eliminate password exposure to users by establishing auto login connection to the systems
  • Broad system support protocols – SSH, RDP, Telnet, VNC, HTTP(S), software clients such as vSphere, SQL Management Studio, iSeries Navigator, X11, Toad for Oracle, HP Tandem, and more…
  • Seamless user experience – allow connectivity via native clients such as PuTTY, MSTSC, WinSCP, Tectia SSH
Access control & workflow
  • Enforce entitlement access policy for who can access what system and account
  • Comprehensive & customizable workflow – supports multiple level approval, either sequential or parallel
  • Support emergency request to ensure operation continuity after working hours, weekend or emergency situation
  • Satisfy least privilege principle and ensure no privilege access is allowed until granted with proper approval and authorization
Application to Application control
  • Provide secured API for real time password retrieval by authorized script/application
  • Eliminate hard-coded password in script/program
  • Rotate password without affecting service or application
Command restriction
  • Support whitelist and blacklist rules
  • Restrict and filter commands during execution
Compliance fulfilment
  • Help organization to comply to industry regulations such as PCI-DSS, ISO 27001/27002, MAS-TRM, HIPAA, SOX404, APRA, COBIT, BNM-GPIS
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Specops Software Key Recovery

Specops Key Recovery is a self-service solution for unlocking computers encrypted by BitLocker and Symantec Endpoint Encryption. A user who is locked out at the pre-boot authentication screen can use Specops Key Recovery to unlock their computer, without calling the helpdesk. For added security, users are verified with multi-factor authentication before receiving a recovery key. The solution supports a number of authentication factors, including Symantec VIP and Mobile Code. Self-service for BitLocker BitLocker lockouts can be caused by hardware changes or occur when working remotely. When a lockout is triggered, the user must call the helpdesk for a recovery password, and use it to unlock their computer. To verify the user, the helpdesk will commonly use security questions, which are prone to social engineering. Specops Key Recovery reduces calls to the helpdesk, and increases security. The solution verifies users with multi-factor authentication so they can receive a recovery key. Self-service for Symantec Endpoint Encryption Symantec Endpoint Encryption lockouts occur when a user forgets their password or changes their password while working remotely. If the user has forgotten the old password they will need to contact the helpdesk for a recovery key every time they restart their computer. When combined with our self-service password reset solution, Specops Key Recovery can update the cached credentials, triggering a re-encryption with the new password. This will allow the user to authenticate with their new password, even if they are outside the corporate network. MFA with pre-enrollment With Specops Key Recovery administrators can enroll users for multi-factor authentication without requiring users to do this themselves. This is possible with identity services that have identifier information stored in Active Directory, such as Symantec VIP, Mobile Code, and Manager Identification. The enrollment information can also be used for self-service password reset, allowing users to manage their passwords in a secure way.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SSH.COM CryptoAuditor

Trust is essential. As we collaborate more from person-to-person, organization-to-organization and machine-to-machine, we must trust colleagues, partners and suppliers with access to our precious networks. You grant access to a staggering number of 3rd parties via encrypted connections. DevOps, M2M and connections to the IoT mean that 3rd party access is exploding. The cost of ad hoc management and troubleshooting of 3rd party access is extraordinary. As well as a cost factor, there is a security risk and compliance problem. Network and data security products do not read, control or investigate who is or was doing what in encrypted sessions. You have no knowledge of events on an individual session-level. Major organizations need security designed for totally compliant and secure session control. SSH.COM’s Fortune 500 customers rely on our intelligent, real-time, granular session control and forensics. SSH.COM CryptoAuditor is a centrally managed virtual appliance for monitoring, controlling and auditing encrypted privileged access and data transfers. It’s designed for deployment in front of server farms, databases and network entry points to solve the problem of poorly monitored privileged access, particularly remote vendor access. It terminates and re-opens privileged user sessions, and inspects and records sessions in real-time before re-encrypting and pushing the session forward. Sessions are indexed and stored in an encrypted database for reporting, replay and forensic investigation. It’s easy to run from the centralized console, and easy to deploy, with no hardware, no agents, no new clients, no user training, and no changes to workflows. It can be deployed in a fully transparent mode with no changes to end-user access and login procedures. SSH.COM CrypoAuditor is cloud-ready, integrates with all major DLP, AV, IDS and SIEM systems, and is used by four of the world’s five largest banks. SSH.COM CryptoAuditor is an intelligent proxy designed for deployment in front of server farms, databases and network entry points.
  • Monitor insider and 3rd party access to your digital core
  • Control remote access by vendors, consultants, home workers, and M2M and IoT connections
  • Define privileged access and activities based on user identity
  • Collect forensic evidence for investigations with every keystroke and every pixel
  • Protect critical data and minimize credentials abuse by enabling two-factor authentication
  • Integrate with existing firewalls, detect attacks earlier and resolve issues in real-time
  • Address individual accountability even for shared accounts with AD/LDAP infrastructure
  • View encrypted SSH, SFTP and Remote Desktop traffic at your boundary
  • Prevent data theft with Data Loss Prevention (DLP) and analytics
  • Record, store and index session audit trails for searches, replay and reporting, with support for 4-eyes review
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
18
logo
Offer a reference bonus
0.00

Status Identity

Device insight Status Identity leverages the array of sensors within mobile devices, along with application logs to authoritatively identify devices. Changes related to device connectivity, operating system, device ID and others are instantly identified and used to prevent unauthorized devices. Use behavior and risk analytics By applying machine learning algorithms to user behavior analysis and device data, Status Identity creates organizational insight that is unavailable through SIEM tools or Access Governance Platforms. Not only does this approach allow for continuous authentication, it works passively in the background to provide a truly frictionless solution. Open API Our flexible APIs can be embedded into existing enterprise access controls to enhance organizational insight and strengthen remediation. With robust reporting capabilities Status Identity’s solution augments SOC resources by automatically stitching hundreds of anomalies observed across multiple entities, users, devices and applications. This allows organizations to implement a holistic and cohesive security strategy. Benefits:
  • Powerful insights with machine learning and behavioral biometrics
  • A truly friction-less user experience
  • Open API for enterprise integrations
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Sterling Identity

Know Who You’re Hiring With thousands of data breaches happening every year, companies need more assurance than ever that their candidates are who they say they are. At the same time, companies are hiring more remote and gig workers, making in-person identity verification more difficult. Your Process, Our Expertise Using Sterling Identity Vertification’s REST APIs, you can integrate identity authentication and validation into your existing systems and processes. It meets Know Your Client due diligence requirements and is constantly updated with the newest changes to identity documents around the world. When AI can’t authenticate the documents automatically, human experts review them immediately, so you still get fast results. We can customize the candidate’s experience, too, so you capture exactly what you need – no more, and no less. It’s simple, easy, and effective – and backed by the best background screening company in the market.
  • Faster screening and onboarding
  • Higher-quality biographic data for fewer screening errors
  • Reduced fraud and impersonation
  • Simple, guided mobile candidate experience available anywhere, anytime
  • Near-instant results that integrate seamlessly into your current hiring process
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

StrikeForce ProtectID

ProtectID® is designed to deliver affordable, flexible, and redundant authentication models for Banks, Corporations, Universities, Government Agencies, and Social Networking websites. ProtectID® can be managed on-site or via our hosted cloud service. StrikeForce Technologies exists in a competitive industry flooded by many different types of cybersecurity technology offerings. We have many distinguishing factors which set us apart from our competition. Our ability to offer a “hybrid” solution consisting of both on-site and hosted cloud services, as well as our ownership of the patents relating to our cybersecurity technologies, allows us to better protect you from all possible angles. Various Authentication Methods ProtectID® has a multitude of potential authentications methods. These methods include:
  • Out-of-Band Phone – #, PIN, OTP, and/or Voice
  • OTP Delivery to Phone via MS, Voice, Email, and/or Push
  • Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint
  • Hard Tokens – Key Fob, USB Key, and/or Wallet Cards
  • Mobile Tokens – iOS, Android, and/or Blackberry
  • Desktop Tokens – Windows, OS X & MacOS, and/or Linux
  • Support for FIDO *coming soon*
Secure Access ProtectID® secures access to the following resources:
  • VPN – IPSec or SSL VPNs
  • Citrix Networks
  • Web Applications – On- Site or Cloud OWA, Sharepoint, Office365, and more
  • Windows Desktop Login
  • Transactions via Out-of-Band Verification
Easy to Provision Explore multiple provisioning methods including
  • Self Service Portal
  • Web Manager
  • HTTP Provisioning Interface
  • Mobile “One Touch” Provisioning
Flexible Deployment ProtectID® has multiple deployment options including:
  • On-Site
  • Cloud
  • Hybrid On-Site + Cloud
  • OEM – Become a Cloud Authentication Provider
  • Flexible Pricing Models
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SurePassID Universal MFA

SurePassID’s multi-factor authentication (MFA) platform enables our customers to lock down access to any application, by any user, on any device, within any network architecture. Deploy MFA for challenging requirements All MFA solutions are not created equal. SurePassID Universal MFA excels by meeting the most challenging requirements:
  • On-premise and hybrid deployment architectures
  • Offline Windows and Mac login using two-factor authentication (2FA)
  • Complex firewall configurations, network pathing, and replication schemes
  • Full auditing – including user logout – for integration with Security Information and Event Management (SIEM) systems
One Platform, Many Benefits
  • Comply fast and easy
  • Reduce costs
  • Increase user convenience
  • Integrate everywhere
  • Improve extensibility
  • Automate administration
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SyferLock GridGuard

SyferLock delivers unparalleled flexibility through a range of solutions to address diverse and evolving authentication needs. Our zero footprint aspect provides device-less, One-Time Password/PIN generation without any additional client-side hardware or software, and without any dependency on a cell phone like SMS text-based solutions. SyferLock’s methodology also allows the creation of a layered approach to current authentication processes: stand alone, or used in conjunction with other factors. SyferLock's two-factor and multi-factor authentication solutions enable enterprises and organizations to comply with authentication mandates imposed by HIPAA, CJIS, FedRAMP, FERC, PCI, SOX, FFIEC, BASEL, and GDPR, among others. Utilizing SyferLock’s Software-Based Authentication Solutions to Cover the Authentication Spectrum At one end of the authentication spectrum you have commonly used static reusable passwords. At the other end of the spectrum you have two-factor authentication. No single authentication solution seems to be flexible enough, adaptable enough and secure enough to help with ever changing business cases and user needs until now. SyferLock has created one of the most flexible, adaptable and secure authentication solutions to enable enterprises to cost-effectively address two-factor authentication / multi-factor authentication across a range of uses cases. SyferLock’s two-factor and multi-factor authentication solutions eliminate or mitigate a range of attacks, including:
  • Key-Logging
  • Shoulder Surfing
  • Brute Force & Dictionary
  • Interception
  • Cross Site Scripting
  • Replay
  • Automated Attacks
  • Sniffing
  • Stored Browser Passwords
  • Man-in-the-Middle
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Systancia Identities and Authorizations (IGA)

Systancia Identity - Powerful management of your entire ecosystem's identities and authorizations for all your applications, on premise or cloud
Systancia Identity, formerly Avencis Hpliance, is an identity governance and administration solution. It allows to manage identities, their membership organizations, their authorizations, and possibly their resources (endowments). Its Workflow module allows the management of many different use cases: flow of people, processes, authorization/resources request... it is provided with an agile synchronization engine that easily integrates into your upstream and downstream repositories. It also provides features such as permission certification and separation of privileged duties (SoD), while allowing traceability and visibility of actions performed via its audit and reporting module. Data protection and leakage prevention Due to the growing amount of data within companies and organizations, and the fact that these data are sometimes sensitive, it is essential to protect them against any potentially devastating risk of leakage, as we are reminded daily by the press. Regulatory compliance, GDPR and ANSSI recommendations Compliance with multiple regulations is sometimes perceived as a constraint, but it is nevertheless necessary to ensure an effective IS security. Organizational agility and improvement of employee movement process Employee movements (turnover, internal rotation, outsourcing and mergers-acquisitions) require that the IT department benefits from real agility in order to facilitate these movements and increase the level of IS security. Agility of the IT department and autonomy of professions Simplify and automate the management of identities and entitlements for greater business autonomy Choose innovation with Systancia Identity
  • Identity lifecycle management with data reconciliation
  • Permissions and authorizations management based on the organizational structure (OrBAC)
  • Automatic provisioning allowing the consolidation of upstream and downstream repositories
  • Re-certification campaigns management and separation of duties (SoD)
  • Workflow allowing to organize tasks in order to simplify and automate the identity management
  • Audits and reports to guarantee regulatory compliance
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Systola SystoLOCK

SystoLOCK provides strong protection for all login dialogs, services, and network protocols by eliminating Windows passwords completely from the network. By using the native Windows PKI functionality, logging into Microsoft Windows-based environments with SystoLOCK is done without additional upstreaming. All digital certificates are managed on the server and are not saved on client devices. How does SystoLOCK improve autentication in Microsoft Windows environments? SystoLOCK uses OTP (One Time Passwords) and PIN for to authenticate users and does not use passwords. Why is SystoLOCK a global novelty in Active Directory environments? SystoLOCK is the first and only MFA solution for Active Directory environments that does not require server-side modifications and protects all network logins, services, and protocols in one swoop. What is the advantage of SystoLOCK on the network level in terms of performance and Security? SystoLOCK is the only MFA solution that supports network-level authentication (NLA), enabling RDP sessions to use the slimmer UDP protocol. Why is SystoLOCK simpler and less expensive than comparable solutions? In contrast to expensive smartcards or elaborate special solutions, SystoLOCK easy in administration and licensing. It uses only one license per user.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

The OptimalCloud

A Complete Identity as a Service (IDaaS) Solution The OptimalCloud™ is a scalable and customizable Identity and Access Management (IAM) solution that deploys easily and provides seamless and secure access to thousands of applications using single sign-on technology. The OptimalCloud offers multi-factor authentication and authorization from any data store, provides delegated administration and user management enablement, can be deployed in the cloud, or federated to other organizations. The OptimalCloud also comes with 24 x 7 x 365 support and a guaranteed 99.9% uptime. Why The OptimalCloud? Below are a few of the key features that set The OptimalCloud ahead of the competition as an Identity as a Service software:
  • Affordable flat monthly fee
  • Completely customizable enterprise-level solution…Your Cloud, Your Way
  • Private dedicated single-tenant and multi-tenant options with servers in data-centers of your choice around the globe
  • Syncing of on-premise identities to the cloud is *NOT* required
  • Included support for ALL standards including WS-Federation, WS-Trust, SAML, Shibboleth, OpenID Connect, OAuth2, SCIM & REST
  • Comprehensive cloud solution including self-service password reset, self-registration, delegated administration, complete identity management, and one-click workflow approvals
  • Deep OAuth2, OpenID Connect & SAML integrations with developer portal access and complete working projects
  • Granular delegated administration authority that can be tied to users and/or organizations
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
15
2
logo
Offer a reference bonus
0.00

The REL-ID Platform

The REL-ID platform is a safe, simple, and scalable security platform that, for the first-time, tightly integrates your identity, authentication, and channel security. By combining strong "relationship" identities with our patented protocol, processes, and flows--- secure, continuously authenticated application channels can be established with blazing speed and at IoT scale. This powerful omnichannel technology enables a phenomenal user experience with every authorization and login while dramatically reducing your attack surface. Platform Capabilities: Strong Authentication Made Simple. Mutual, simultaneous, and continuous multi-factor authentication. All right within your own native app with the authenticator of your choice. Phenomenal User Experience. Built for the mobile-first world to deliver a simple, consistent, and phenomenal user experience that increases engagement. True Omnichannel Support. Provide customers a consistent and phenomenal experience across all channels - online, mobile, IVR, call center, chat, kiosk, and in-person. Channel Security. Connect over a whitelist based secure communication tunnel that is MITM proof and more secure than TLS. Without any of the operational complexity or cost. Secure Data-at-Rest. Encrypt data stored locally on the device using a key that doesn't exist until a fully verified and trusted context is established. For security better than Trusted Execution Environments. Device Trustworthiness. Use military-grade root/jailbreak/malware detection at consumer speed to block connections from vulnerable or compromised devices. Simple Integration. Our mobile SDK lets you add the right level of security to your mobile app, tuned to your needs and the risk profile. Customizable Policy Controls. Customize a comprehensive set of policy controls based on device, user and other context variables that allow you to meet your unique business needs and risk parameters.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
17
logo
Offer a reference bonus
0.00

The SAASPASS Platform

SAASPASS authenticates and secures different objects within the Internet of Things (IoT). The IoT bridges the digital and the physical worlds and SAASPASS merges identity management from both to secure identities, applications and objects within this interconnected web. SAASPASS solves IoT security and identity management concerns by always providing two-factor authentication through mobile devices, barcode scans and bluetooth low energy (BLE). SAASPASS Proximity with BLE runs invisibly in the background and coordinates identities, interactions and objects with IoT ecosystems. SAASPASS secures not only obvious digital IoT components like mobile applications and email, but physically integrated items like cars, health wearables, offices and homes. The SAASPASS platform is flexible enough to bring the strong security of office email into a place you surely want strong security--your home.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
15
logo
Offer a reference bonus
0.00

TokenOne

TokenOne allows users to verify their real world credentials and identity, register their phone as a token and create a secure and secret PIN. A user can complete all necessary steps in a way that enables an organisation to meet both identity proofing and legal compliance requirements. Users can also add credentials as required by an organisation’s business rules. Technology Overview Patented Technology Based on principles of industry recognised uncrackable form of encryption (One-Time Pad). No Algorithms Ensures TokenOne is not vulnerable to someone cracking an algorithm and compromising multiple accounts and all the reliant services and infrastructure. Self Management Users register their device as a true and unique token and create their own PIN. Ongoing management of both is also done by the user. Authentication Secure and simple by proving the presence of the device and mentally scrambling the PIN. Genuine strong 2FA As both factors are strong, TokenOne proves the presence of the device AND the user and is one of the few mass market authentication solutions where both factors are strong. PIN never revealed ​ The user knows their PIN which is never entered or revealed to anyone, not even to TokenOne or the service the user is accessing. Strong Two-Factor Authentication in Three Easy Steps
  1. Download the App
  2. Scan QR code and Register
  3. Encode your secret PIN
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.