View

Sorting

Products found: 10

logo
Offer a reference bonus
0.00

LastPass MFA

Leverage biometric and contextual factors to better protect your business while offering a passwordless user experience for employees.

LastPass MFA goes beyond standard two-factor authentication to ensure the right users are accessing the right data at the right time, without added complexity.

  • Adaptive authentication. LastPass MFA combines biometric and contextual intelligence to prove a user’s identity with a combination of factors.
  • Passwordless user experience. Authenticate users seamlessly across all their devices, with a passwordless experience that doesn’t disrupt their workflow or slow them down.
  • Secure every access point. From cloud to on-premise applications, VPN and workstation, LastPass MFA secures every access point to the business.
  • Customize for your business. Get ultimate flexibility with a variety of MFA methods that can be applied at the user or group level.

Thwart attackers, not IT

LastPass MFA offers an intuitive multifactor experience that’s easy for admins to deploy and effortless for employees to adopt.

  • Simple deployment. No additional training or services required. LastPass MFA delivers security quickly while saving time and resources.
  • Centralized, granular control. An extensive list of granular policies control user access at an individual, group, and organizational level.
  • Convenient integrations. Automate user provisioning with user directories like Microsoft AD and Microsoft Azure, with easy setup and minimal day-to-day management.
  • Security by design. Biometric data is encrypted at the device level and never leaves the user’s device, so biometric data remains private and secure.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
1
logo
Offer a reference bonus
0.00

Nok Nok S3 Authentication Suite

The Nok Nok S3 Authentication Suite enables FIDO certified multi-factor authentication (FIDO UAF, FIDO U2F, WebAuthn, and FIDO2) for mobile and web applications. Rather than the unpleasant experience of entering usernames and passwords, users can enjoy using the latest biometric authentication technology that already exists on their devices. Universal Authentication Server Nok Nok™ Authentication Server in conjunction with Nok Nok App SDK delivers delivers robust multi-factor authentication using the existing security features of a user's device (such as a fingerprint sensor) instead of a password. The Server supports emerging industry standards from the FIDO Alliance and provide organizations with a unified interface to incorporate strong authentication. Key features of the Authentication server:
  • Account Recovery
  • Auditing capabilities
  • Federation Support e.g. IBM SAM, PingFederate, ForgeRock
  • FIDO UAF, FIDO U2F, Web Authentication, and FIDO2 Protocol support
  • Industry compliance based implementation e.g. SOX, PSD2, HIPAA etc.
  • Multi-tenancy support
  • Out of Band Authentication Support
  • Policy Based Authentication
  • Reporting capabilities
  • REST API for easy integration into custom web applications
  • Web based administrative user interface
App SDK for Smart Watch The Nok Nok App SDK for Smart Watch allows customers to standardize on next-generation authentication across all digital channels - including smart watches. Smart watch apps can have a strong, device-bound credential that doesn’t need frequent renewal and server-side infrastructure can be standardized to support industry standards, including FIDO next-generation authentication - across all digital channels. Mobile Passport Application Passport from Nok Nok is an authentication app that supports the FIDO Universal Authentication Framework (UAF) protocol. Further, it also supports out-of-band authentication to authenticate to selected websites on a laptop or desktop computer. Gateway Nok Nok Gateway offering is designed to facilitate the ease of FIDO enablement of Mobile Apps and its integration to the Nok Nok Authentication Server. Key benefits of this offering include: Single API call from the Mobile App - to trigger registration, authentication and deregistration process; Easy enablement and handling of network communications/Session management with the Nok Nok Authentication Server.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
15
logo
Offer a reference bonus
0.00

SSH.COM CryptoAuditor

Trust is essential. As we collaborate more from person-to-person, organization-to-organization and machine-to-machine, we must trust colleagues, partners and suppliers with access to our precious networks. You grant access to a staggering number of 3rd parties via encrypted connections. DevOps, M2M and connections to the IoT mean that 3rd party access is exploding. The cost of ad hoc management and troubleshooting of 3rd party access is extraordinary. As well as a cost factor, there is a security risk and compliance problem. Network and data security products do not read, control or investigate who is or was doing what in encrypted sessions. You have no knowledge of events on an individual session-level. Major organizations need security designed for totally compliant and secure session control. SSH.COM’s Fortune 500 customers rely on our intelligent, real-time, granular session control and forensics. SSH.COM CryptoAuditor is a centrally managed virtual appliance for monitoring, controlling and auditing encrypted privileged access and data transfers. It’s designed for deployment in front of server farms, databases and network entry points to solve the problem of poorly monitored privileged access, particularly remote vendor access. It terminates and re-opens privileged user sessions, and inspects and records sessions in real-time before re-encrypting and pushing the session forward. Sessions are indexed and stored in an encrypted database for reporting, replay and forensic investigation. It’s easy to run from the centralized console, and easy to deploy, with no hardware, no agents, no new clients, no user training, and no changes to workflows. It can be deployed in a fully transparent mode with no changes to end-user access and login procedures. SSH.COM CrypoAuditor is cloud-ready, integrates with all major DLP, AV, IDS and SIEM systems, and is used by four of the world’s five largest banks. SSH.COM CryptoAuditor is an intelligent proxy designed for deployment in front of server farms, databases and network entry points.
  • Monitor insider and 3rd party access to your digital core
  • Control remote access by vendors, consultants, home workers, and M2M and IoT connections
  • Define privileged access and activities based on user identity
  • Collect forensic evidence for investigations with every keystroke and every pixel
  • Protect critical data and minimize credentials abuse by enabling two-factor authentication
  • Integrate with existing firewalls, detect attacks earlier and resolve issues in real-time
  • Address individual accountability even for shared accounts with AD/LDAP infrastructure
  • View encrypted SSH, SFTP and Remote Desktop traffic at your boundary
  • Prevent data theft with Data Loss Prevention (DLP) and analytics
  • Record, store and index session audit trails for searches, replay and reporting, with support for 4-eyes review
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
18
logo
Offer a reference bonus
0.00

The OptimalCloud

A Complete Identity as a Service (IDaaS) Solution The OptimalCloud™ is a scalable and customizable Identity and Access Management (IAM) solution that deploys easily and provides seamless and secure access to thousands of applications using single sign-on technology. The OptimalCloud offers multi-factor authentication and authorization from any data store, provides delegated administration and user management enablement, can be deployed in the cloud, or federated to other organizations. The OptimalCloud also comes with 24 x 7 x 365 support and a guaranteed 99.9% uptime. Why The OptimalCloud? Below are a few of the key features that set The OptimalCloud ahead of the competition as an Identity as a Service software:
  • Affordable flat monthly fee
  • Completely customizable enterprise-level solution…Your Cloud, Your Way
  • Private dedicated single-tenant and multi-tenant options with servers in data-centers of your choice around the globe
  • Syncing of on-premise identities to the cloud is *NOT* required
  • Included support for ALL standards including WS-Federation, WS-Trust, SAML, Shibboleth, OpenID Connect, OAuth2, SCIM & REST
  • Comprehensive cloud solution including self-service password reset, self-registration, delegated administration, complete identity management, and one-click workflow approvals
  • Deep OAuth2, OpenID Connect & SAML integrations with developer portal access and complete working projects
  • Granular delegated administration authority that can be tied to users and/or organizations
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
15
2
logo
Offer a reference bonus
0.00

The REL-ID Platform

The REL-ID platform is a safe, simple, and scalable security platform that, for the first-time, tightly integrates your identity, authentication, and channel security. By combining strong "relationship" identities with our patented protocol, processes, and flows--- secure, continuously authenticated application channels can be established with blazing speed and at IoT scale. This powerful omnichannel technology enables a phenomenal user experience with every authorization and login while dramatically reducing your attack surface. Platform Capabilities: Strong Authentication Made Simple. Mutual, simultaneous, and continuous multi-factor authentication. All right within your own native app with the authenticator of your choice. Phenomenal User Experience. Built for the mobile-first world to deliver a simple, consistent, and phenomenal user experience that increases engagement. True Omnichannel Support. Provide customers a consistent and phenomenal experience across all channels - online, mobile, IVR, call center, chat, kiosk, and in-person. Channel Security. Connect over a whitelist based secure communication tunnel that is MITM proof and more secure than TLS. Without any of the operational complexity or cost. Secure Data-at-Rest. Encrypt data stored locally on the device using a key that doesn't exist until a fully verified and trusted context is established. For security better than Trusted Execution Environments. Device Trustworthiness. Use military-grade root/jailbreak/malware detection at consumer speed to block connections from vulnerable or compromised devices. Simple Integration. Our mobile SDK lets you add the right level of security to your mobile app, tuned to your needs and the risk profile. Customizable Policy Controls. Customize a comprehensive set of policy controls based on device, user and other context variables that allow you to meet your unique business needs and risk parameters.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
17
logo
Offer a reference bonus
0.00

The SAASPASS Platform

SAASPASS authenticates and secures different objects within the Internet of Things (IoT). The IoT bridges the digital and the physical worlds and SAASPASS merges identity management from both to secure identities, applications and objects within this interconnected web. SAASPASS solves IoT security and identity management concerns by always providing two-factor authentication through mobile devices, barcode scans and bluetooth low energy (BLE). SAASPASS Proximity with BLE runs invisibly in the background and coordinates identities, interactions and objects with IoT ecosystems. SAASPASS secures not only obvious digital IoT components like mobile applications and email, but physically integrated items like cars, health wearables, offices and homes. The SAASPASS platform is flexible enough to bring the strong security of office email into a place you surely want strong security--your home.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
15
logo
Offer a reference bonus
0.00

Trusfort Smart Door Lock Security

Today, IoT devices represented by smart homes and wearable devices have emerged in an endless stream. The emergence of functional bracelets, functional sockets, sweeping robots, window cleaning robots, and AI voice assistants have greatly enriched people's daily lives. Due to its convenient use and wide application scenarios, the smart door lock has received extensive attention since its launch. Today's smart door locks generally have a variety of unlocking methods, such as fingerprint unlocking, password unlocking, APP unlocking, remote unlocking, without carrying the key, the application experience of one click to open is highly respected by the majority of users. Unlike other IoT devices, door locks are responsible for room access, so security issues have become a top priority for it. A little search on the Internet can get information about security risks such as man-in-the-middle attacks, replay attacks and APP cracks of smart door locks. Smart door lock products need a system base level operation technology and a high level of security to support its wide range of application scenarios. The multi-factor authentication product (MFA) of the Trusfort has many patented technologies such as device fingerprint, soft security space, and device threat awareness. It can effectively identify the uniqueness of mobile devices and the Internet of Things, and protect data security during data transmission with built-in security keys. It can resist multiple intrusion and monitoring methods including replay attacks, man-in-the-middle attacks, data reorganization, and effectively guarantee the security of the IoT device and network communication.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
4
logo
Offer a reference bonus
0.00

UL 3DS Self Test Platform

Digital commerce authentication through the new EMV® 3-D Secure protocol UL self-test platform for 3DS: Promoting compliance testing for 3D-secure technology

Go beyond compliance testing with end-to-end, real-life 3-D Secure flow simulation and validation

EMV® 3-D Secure (3DS) certification is the first step in 3DS solution success. That’s why UL’s 3DS Self-Test Platform is more comprehensive than ever. Platform now provides testing and compliance services for 3-D Secure, plus real-life, end-to-end simulation and validation across numerous payment scenarios. This plug-and-play platform allows different components to be tested in a scalable and automated user interface/user experience(UI/UX) environment.

Improve development time and go-to-market speed

 3DS Self-Test Platform is a configurable and versatile web-based platform that simulates the entire 3-D Secure ecosystem based on the EMV 3-D Secure protocol and core functions specification. It offers you the ability to debug, test, and verify compliance before submitting test results for formal approval. This can help speed up development and go-to-market time. The platform provides:
  • Single-solution testing environment and formal approval services
  • Comprehensive 3DS approval process support
  • Enhanced debugging features and interface
  • Guaranteed up-to-date EMV 3DS specifications
  • EMVCo regulatory and specification compliance
  • European Payments Service Directive 2 exemptions for Strong Consumer
  • Authentication (SCA)

Simulate and verify from cart-to-checkout

UL Merchant Simulator within the Self-Test platform offers interoperability and user experience testing for 3DS components. It allows you to test in an end-to-end environment across the acquirer, interoperability and issuer domains. You can simulate a real web shopping experience allowing you to buy goods and validate the UX of a 3DS flow. You can also select various payment cards to trigger challenge and frictionless flows in different browser and app interfaces across multiple authentication methods.

UL Merchant Simulator helps promote a successful 3DS experience:

  • Test across the three domains: acquirer, interoperability, and issuer
  • Helps accelerate availability, enhance reliability, and improves performance
  • Validate product interoperability between vendors, merchants, and banks Pretest payment brand protocol extensions
  • Gain data visibility for the proper collecting and scoring of devices and users
  • Test user interface experience for EMV 3DS events

Testing applications

Replace any simulated components with a certified product for interoperability testing.
3DS vendors, PSPs and merchants:
  • Test SDKs, website and mobile apps against an EMV 3DS certified server
  • Test server against EMV 3DS certified SDKs within browsers, iOS and Android clients
Test against functional DS and an issuing bank’s ACS3DS vendors and payment networks:
  • Test against EMV 3DS certified merchant requester (server and SDKs for browser, iOS and Android) and an issuing bank’s ACS 3DS vendors and banks
  • Test against the DS and an EMV 3DS certified merchant requester (server and SDKs for browser, iOS and Android)

Empowering trustworthy commerce

With a focus on today’s realities and tomorrow’s needs, UL provides the trusted and critical expertise that is required in an interconnected and cashless world. Company's payment expertise enables businesses to implement innovations that guarantee regulatory compliance, maintain customer trust, and increase market access



... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
5
logo
Offer a reference bonus
0.00

UniquID

UniquID is the Identity as a Service to leverage the emerging standards for a decentralized IoT. We improve the efficiency of the operation of enterprises that need to Provision, Connect and Control critical assets (sensors, actuators, appliances) overcoming the scalability burden of legacy protocols. The challenge of maintaining control at the edge of IoT networks A shift to distributed networks of heterogeneous smart devices is introducing key challenges for the people responsible for the infrastructure: Operations Spreadsheets with serial numbers, passwords, x.509 certificates introduce complex and repetitive processes. Applied to IoT devices, every minute needed in the field will multiply the Total Cost of Ownership (TCO), hitting the profits of associated products and services. Engineering Building and maintaining the right mix of Certification Authorities, Hardcoded Keys and Management Platforms requires the right talent and months of hard work. The absence of a shared control framework between devices, gateways and cloud applications multiplies these efforts and costs. Security Firewalls, Single Sign-On, Multi-Factor Authentications, are critical to secure advanced IoT solutions and preserve the integrity of data in motion. But the lowest-power endpoints, running in the field, are vulnerable to attacks that are challenging to prevent and detect from the cloud.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
9
logo
Offer a reference bonus
0.00

VeridiumID

This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography. VeridiumID installs easily within your network to provide authentication to enterprise applications, websites, even doors. And it works just by you being you. You can use VeridiumID to replace hard and soft tokens as a second authentication factor. In addition to what you know – your password – you are adding two additional factors; what you have – your mobile device – and what you are – your biometrics. Are you ready to eliminate passwords? Our technology and unique storage architecture combine to provide true identity authentication. The software handles everything from biometric data collection and encryption, secure storage, and the ability to perform matching on the device or server during authentication sessions. VeridiumID Benefits:
  • Supports multiple biometric libraries, including 4 Finger TouchlessID, allowing for complete configuration of authentication systems
  • Provides complete control over the entire solution, from configuring the biometrics used to set rules for varying security demands
  • By encrypting biometric vectors with Visual Cryptography and storing them between the device and server, it is nearly impossible for them to be compromised or stolen
  • Built on open standard IEEE 2410 and supported by a working group which continues to advance this standard, future-proofing your investment
  • Easily integrates into your existing corporate infrastructure without additional hardware
  • Reduces password resets, help desk requests and support calls by up to 90 percent
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
2
17

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.