Top Featured Resources|

Pattern-based Authentication: Solving the Password Problem

Passwords are becoming more complex for humans to use and easier for machines to crack. In this white paper, we delve into the password problem, how this method is currently doing more harm than good, and how pattern-based authentication can eliminate the problem.

Datasheets

Password Security Management (PSM)

Password Security Management is a comprehensive real-time solution to ensure that user passwords comply with regulations and that they have not already been compromised on the web.

Multi-Factor Authentication (MFA)

Authlogics Multi-Factor Authentication is a highly scalable enterprise-class solution for secure login and password replacement. Benefit from a simple and consistent user experience across applications, platforms and locations.

Passwordless Windows Desktop Access

Accessing Windows Desktop has never been easier. Remove the need to enter a password during the CTRL+ALT+DELETE Windows logon process, and improve logon security by adding multi-factor authentication to all versions of Windows

Authlogics for Azure & Office 365

The Authlogics solution for Azure and Office 365 provides secure authenticated access from inside and outside the network to cater for a multitude of scenarios beyond what Microsoft provides. Use our Multi-Factor and password security management solutions to provide secure, convenient access to your critical company information stored in the Microsoft Cloud.

Authlogics PINgrid

PINgrid is a robust pattern-based authentication and transaction signing solution that’s uses our ability to remember patterns or shapes to generate one time codes.

Authlogics PINphrase

PINphrase is a user friendly, sentence or phrase based authentication type where users provide single characters from an answer to a well known question only they know.

Authlogics PINpass

PINpass is a standards-based OATH compliant authentication solution which uses one time codes generated on a separate device, usually in conjunction with a password.

Authlogics Journey

The Authlogics solution for Azure and Office 365 provides secure authenticated access from inside and outside the network to cater for a multitude of scenarios beyond what Microsoft provides.

Case Studies

Customer:

NHS Salisbury Foundation Trust

Solution:

PSM

Sector:

Hospital & Healthcare

Mission:

NHS Trust turns to Authlogics to simplify their password policy and improve logon security.

Customer:

King Fahd University of Petroleum & Minerals

Solution:

MFA

Sector:

Higher Education

Mission:

KFUPM were looking for a solution that would secure their resources and protect from cybersecurity threats and phishing attacks in particular.

Customer:

BeyondTrust

Solution:

PSM

Sector:

Computer & Network Security

Mission:

When BeyondTrust needed to find a way of enforcing NIST SP 800-63B compliant passwords company-wide, it turned to Authlogics.

Customer:

St Petersburg City Council

Solution:

MFA

Sector:

Government

Mission:

Major US City Council depends on PINgrid to secure remote access to key resources.

Customer:

Orion Technologies

Solution:

MFA

Sector:

Defence Contract Supplier

Mission:

Orion Technology used Azure MFA with Active Directory and whilst this proved sufficient for cloud-based applications it lacked the MFA necessary when physically logging in to Microsoft Windows.

Customer:

NHS Liverpool Heart & Chest Foundation Trust

Solution:

MFA

Sector:

Government

Mission:

Liverpool Heart and Chest Hospital NHS Foundation Trust deploys PINgrid 1.5 Factor to replace time-consuming and convoluted hard tokens.

Customer:

JM Finn

Solution:

MFA

Sector:

Investment Management

Mission:

PINgrid makes it easy for investment managers to trade wherever they are without additional hardware.

Customer:

Webber Wentzel

Solution:

MFA

Sector:

Law Practice

Mission:

Major South African law firm depends on PINgrid to secure remote access to sensitive client documents.

Customer:

Taylor Wessing

Solution:

MFA

Sector:

Legal Services

Mission:

With a view that passwords should not feature in the future of its security and authentication procedures, the IT department at Taylor Wessing took an innovative step towards passwordless authentication.

Whitepapers

Pattern-based Authentication - Solving the password problem

Passwords are becoming more complex for humans to use and easier for machines to crack. In this white paper, we will delve into the password problem, how this method is today doing more harm than good, and how pattern-based authentication can eliminate the problem.

Prevent Identity Theft with Two-Way Identification

The Authlogics solution for Azure and Office 365 provides secure authenticated access from inside and outside the network to cater for a multitude of scenarios beyond what Microsoft provides.

Deviceless OTP - Technology Drilldown

Deviceless OTP Authentication is a technology class unique to a small group of companies that technically relies on a single factor for authentication, “ something you know”, however for the most part limits or mitigates the attacks that traditional passwords are susceptible to. Deviceless OTP technology requires no additional physical devices, software tokens, or biometric scanners which significantly keeps costs down and lowers user friction.

Achieving Cybersecurity Maturity Model Compliance (CMMC)

The Cybersecurity Maturity Model Certification (CMMC) is a certification and compliance process developed by the Department of Defense (DoD). CMMC requires DoD contractors to have their systems audited by a 3rd-party. See how Authlogics can help companies become compliant and prove ongoing compliance with CMMC regulations.

Authlogics within the SAMA Cybersecurity Framework

Deviceless OTP Authentication is a technology class unique to a small group of companies that technically relies on a single factor for authentication, “ something you know”, however for the most part limits or mitigates the attacks that traditional passwords are susceptible to. Deviceless OTP technology requires no additional physical devices, software tokens, or biometric scanners which significantly keeps costs down and lowers user friction.

Gartner Publications

Quick Answer: What Does a Good Password Policy Look Like?

Despite the advent of passwordless authentication, passwords persist in many use cases and remain a significant source of risk and user frustration. SRM leaders responsible for IAM should craft a clear and actionable policy that discards ineffective legacy rules to better balance security and UX.

Take 3 Steps Toward Passwordless Authentication

Eliminating login passwords can improve both UX and security, but passwordless authentication is not a discrete technology or a distinct market. SRM leaders responsible for IAM must carefully identify their objectives and options to prioritize time to value along the path to a passwordless future.

Passwordless Authentication Is Here and There, but Not Everywhere

There are many ways to eliminate passwords, improving the user/customer experience and/or enhancing security; however, technological constraints make a universal approach elusive. Security and risk management leaders responsible for IAM need a cohesive strategy across key use cases.

Infographics

Data Breach Guide

Follow Authlogics simple 5 step guide to recovering from a data breach.