View
Sorting
Products found: 28
LastPass MFA
Leverage biometric and contextual factors to better protect your business while offering a passwordless user experience for employees.
LastPass MFA goes beyond standard two-factor authentication to ensure the right users are accessing the right data at the right time, without added complexity.
- Adaptive authentication. LastPass MFA combines biometric and contextual intelligence to prove a user’s identity with a combination of factors.
- Passwordless user experience. Authenticate users seamlessly across all their devices, with a passwordless experience that doesn’t disrupt their workflow or slow them down.
- Secure every access point. From cloud to on-premise applications, VPN and workstation, LastPass MFA secures every access point to the business.
- Customize for your business. Get ultimate flexibility with a variety of MFA methods that can be applied at the user or group level.
Thwart attackers, not IT
LastPass MFA offers an intuitive multifactor experience that’s easy for admins to deploy and effortless for employees to adopt.
- Simple deployment. No additional training or services required. LastPass MFA delivers security quickly while saving time and resources.
- Centralized, granular control. An extensive list of granular policies control user access at an individual, group, and organizational level.
- Convenient integrations. Automate user provisioning with user directories like Microsoft AD and Microsoft Azure, with easy setup and minimal day-to-day management.
- Security by design. Biometric data is encrypted at the device level and never leaves the user’s device, so biometric data remains private and secure.
Nok Nok S3 Authentication Suite
- Account Recovery
- Auditing capabilities
- Federation Support e.g. IBM SAM, PingFederate, ForgeRock
- FIDO UAF, FIDO U2F, Web Authentication, and FIDO2 Protocol support
- Industry compliance based implementation e.g. SOX, PSD2, HIPAA etc.
- Multi-tenancy support
- Out of Band Authentication Support
- Policy Based Authentication
- Reporting capabilities
- REST API for easy integration into custom web applications
- Web based administrative user interface
Secret Double Octopus Authenticator App
- Easy and fast user enrollment
- Supports offline authentication
- Built on proven Secret Sharing cryptography
- Available on iOS and Android devices
- The Octopus Authenticator. The Octopus Authenticator app for the simplest user experience. Users validate their identity with a touch of their thumb or face ID, followed by a second biometric verification step.
- FIDO2 Authenticators. Our certified FIDO2 server is fully compatible with any FIDO2 authenticators.
- 3rd Party MFA. The Octopus Server is happy to connect with your existing MFA, our solution seamlessly integrate with Okta Verify and other leading MFA providers.
- Deploys on-premise or in the cloud
- Multi-factor, high-assurance authentication
- Integrates with existing business systems and applications
- Passwordless, “touch-and-go” experience
SecureAuth Identity Platform
- Strengthen security without user disruption. Based on your risk tolerance, the Identity Platform evaluates multiple contextual and risk factors only requiring additional authentication if risk is present.
- Increase authentication choice & flexibility. With nearly 30 MFA methods supported, SecureAuth can meet both unique and common use cases while providing ultimate MFA choices for your users.
- Deployment freedom. Gain the freedom to choose hybrid, on-prem, or cloud deployments, and the flexibility to evolve in the future, without compromising functionality.
- Reduce IT burden & increase productivity. Self-service options decrease your reliance on IT help desk resources, lowering costs and improving user productivity with 24/7 availability.
SecurEnvoy SecureIdentity Platform
- MFA. SecureIdentity multi-factor authentication (MFA) provides the security of user identity by verifying that a person is who they claim to be, utilising something the user knows (Password/PIN), something they have (Software/Hardware Token) and something they are (Biometric/ Facial Recognition).
- IAM. SecureIdentity IAM enforces access decisions around applications and data repositories. Our solution enhances security by blocking systems such as Shadow IT and by enforcing strong data boundaries and separation of duties.
- CASB. SecureIdentity CASB allows for a layer of security between your traditional on-premise infrastructure and your cloud based SaaS, PaaS and IaaS components.
- IRAD. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risk s
- PAM. SecureIdentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all.
- DLP. SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud), which can prevent the loss of data from malware, insider threat and human error.
SendSafely Platform
- Easy to Use. SendSafely works natively with all major browsers. No software to install, no encryption keys to manage.
- Secure & Compliant. Use SendSafely for compliance with regulations like HIPAA (BAA available), GDPR, CCPA and more.
- Integrated. Use one of our pre-built platform connectors or easily create your own integration with our developer API.
- Enterprise Ready. Features designed for businesses such as user administration, single sign on and custom branding.
- Secure Email. Pre-built integrations for Outlook and Gmail encrypt messages and attachments with the click of a button, or use our email gateway to automatically protect all outbound email.
- Secure File Exchange. Our secure file exchange portal lets you send and receive very large files securely from anyone, and you can collaborate across teams using our Secure Workspace feature.
- Help Desk Integrations. Secure your support workflow with native apps for Zendesk, Salesforce Service Cloud and Freshdesk. Our Dropzone also integrates with many popular help desk platforms.
- SendSafely Dropzone. Securely collect files from any user on any device. Use our turn-key hosted version or embed the Drozpone on your own website. You can even integrate the Dropzone with your existing workflows.
Silverlake MasterSAM Star Gate
- Secured vault to store and manage privileged credentials according to complexity policy & flexible reset mechanism – automatically after use, manual or scheduled
- Split password protection to ensure none can get to know the entire password during the password release cycle, satisfying the 4-eyes principle rule
- Password verification & reconciliation to ensure managed passwords are always in-sync
- Broad system support to to enterprise systems including server, database, application, security & network devices, and more…
- Real time recording with screen capture technology for each privileged access activities in proprietary format
- Smart mechanism to record based on user interactive activities, colour/grayscale recording
- Tamper proof and real time transfer of recorded data to centralised log repository
- Provide extra layer of security authentication for each privileged access
- Support multiple factor authentication such as AD, LDAP, RADIUS, username/password, SMS token, SMTP email token, built-in mobile apps token, integration with enterprise 2FA
- Centralised access point for administrators to connect to managed systems
- ONE ID to remember
- Eliminate password exposure to users by establishing auto login connection to the systems
- Broad system support protocols – SSH, RDP, Telnet, VNC, HTTP(S), software clients such as vSphere, SQL Management Studio, iSeries Navigator, X11, Toad for Oracle, HP Tandem, and more…
- Seamless user experience – allow connectivity via native clients such as PuTTY, MSTSC, WinSCP, Tectia SSH
- Enforce entitlement access policy for who can access what system and account
- Comprehensive & customizable workflow – supports multiple level approval, either sequential or parallel
- Support emergency request to ensure operation continuity after working hours, weekend or emergency situation
- Satisfy least privilege principle and ensure no privilege access is allowed until granted with proper approval and authorization
- Provide secured API for real time password retrieval by authorized script/application
- Eliminate hard-coded password in script/program
- Rotate password without affecting service or application
- Support whitelist and blacklist rules
- Restrict and filter commands during execution
- Help organization to comply to industry regulations such as PCI-DSS, ISO 27001/27002, MAS-TRM, HIPAA, SOX404, APRA, COBIT, BNM-GPIS
Specops Software Key Recovery
SSH.COM CryptoAuditor
- Monitor insider and 3rd party access to your digital core
- Control remote access by vendors, consultants, home workers, and M2M and IoT connections
- Define privileged access and activities based on user identity
- Collect forensic evidence for investigations with every keystroke and every pixel
- Protect critical data and minimize credentials abuse by enabling two-factor authentication
- Integrate with existing firewalls, detect attacks earlier and resolve issues in real-time
- Address individual accountability even for shared accounts with AD/LDAP infrastructure
- View encrypted SSH, SFTP and Remote Desktop traffic at your boundary
- Prevent data theft with Data Loss Prevention (DLP) and analytics
- Record, store and index session audit trails for searches, replay and reporting, with support for 4-eyes review
Status Identity
- Powerful insights with machine learning and behavioral biometrics
- A truly friction-less user experience
- Open API for enterprise integrations
Sterling Identity
- Faster screening and onboarding
- Higher-quality biographic data for fewer screening errors
- Reduced fraud and impersonation
- Simple, guided mobile candidate experience available anywhere, anytime
- Near-instant results that integrate seamlessly into your current hiring process
StrikeForce ProtectID
- Out-of-Band Phone – #, PIN, OTP, and/or Voice
- OTP Delivery to Phone via MS, Voice, Email, and/or Push
- Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint
- Hard Tokens – Key Fob, USB Key, and/or Wallet Cards
- Mobile Tokens – iOS, Android, and/or Blackberry
- Desktop Tokens – Windows, OS X & MacOS, and/or Linux
- Support for FIDO *coming soon*
- VPN – IPSec or SSL VPNs
- Citrix Networks
- Web Applications – On- Site or Cloud OWA, Sharepoint, Office365, and more
- Windows Desktop Login
- Transactions via Out-of-Band Verification
- Self Service Portal
- Web Manager
- HTTP Provisioning Interface
- Mobile “One Touch” Provisioning
- On-Site
- Cloud
- Hybrid On-Site + Cloud
- OEM – Become a Cloud Authentication Provider
- Flexible Pricing Models
SurePassID Universal MFA
- On-premise and hybrid deployment architectures
- Offline Windows and Mac login using two-factor authentication (2FA)
- Complex firewall configurations, network pathing, and replication schemes
- Full auditing – including user logout – for integration with Security Information and Event Management (SIEM) systems
- Comply fast and easy
- Reduce costs
- Increase user convenience
- Integrate everywhere
- Improve extensibility
- Automate administration
SyferLock GridGuard
- Key-Logging
- Shoulder Surfing
- Brute Force & Dictionary
- Interception
- Cross Site Scripting
- Replay
- Automated Attacks
- Sniffing
- Stored Browser Passwords
- Man-in-the-Middle
Systancia Identities and Authorizations (IGA)
- Identity lifecycle management with data reconciliation
- Permissions and authorizations management based on the organizational structure (OrBAC)
- Automatic provisioning allowing the consolidation of upstream and downstream repositories
- Re-certification campaigns management and separation of duties (SoD)
- Workflow allowing to organize tasks in order to simplify and automate the identity management
- Audits and reports to guarantee regulatory compliance
Systola SystoLOCK
The OptimalCloud
- Affordable flat monthly fee
- Completely customizable enterprise-level solution…Your Cloud, Your Way
- Private dedicated single-tenant and multi-tenant options with servers in data-centers of your choice around the globe
- Syncing of on-premise identities to the cloud is *NOT* required
- Included support for ALL standards including WS-Federation, WS-Trust, SAML, Shibboleth, OpenID Connect, OAuth2, SCIM & REST
- Comprehensive cloud solution including self-service password reset, self-registration, delegated administration, complete identity management, and one-click workflow approvals
- Deep OAuth2, OpenID Connect & SAML integrations with developer portal access and complete working projects
- Granular delegated administration authority that can be tied to users and/or organizations
The REL-ID Platform
The SAASPASS Platform
TokenOne
- Download the App
- Scan QR code and Register
- Encode your secret PIN
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.