Whitepapers

Our whitepapers offer detailed insights into common and current authentication challenges and provide clear, detailed solutions to these problems. Click on an image to download the PDF.

Download PDF

What makes a true Multi Factor Authentication solution?

This paper brings much needed attention to what truly makes a Multi Factor Authentication, well, multi factor.

Download PDF

Authlogics for Azure and Office 365

How Authlogics adds real value to Azure and Office 365 above and beyond the Microsoft MFA offering.

Download PDF

Authlogics Two-Way Identification

Finally, a simple way to know who’s calling you over the phone, and prove who you are to somebody too.

Download PDF

Reduce Helpdesk Costs using PINgrid

Learn more about how PINgrid can be used to increase service and helpdesk functions as well as reduce operational costs associated with these functions within an organisation.

Download PDF

Matrix Pattern Authentication – more than a mind game

Many studies and experiments have been performed by Neuroscientists around how humans memorise and recall information. Find out more about how this can be turned into a useful authentication technology.

Download PDF

Achieving GCSx CoCo Compliance with Authlogics

Government Connect (CoCo) is a UK pan-government program providing an accredited and secure network between central government and every local authority in England and Wales. See how PINgrid can help with your compliance requirements.

Download PDF

Does Remote Desktop logon meet your security policy requirements?

Learn how we can help bridge the gap between Remote Desktop and your Security Policy using Remote Desktop Agent.

Download PDF

The Problem With Passwords

Authenticating people to computers and services is a classic case of human versus machine interaction, coupled with a security problem. Here we discuss common attempts at solutions and how PINgrid solves this problem.

Download PDF

The low down on Operation High Roller

Operation High Roller was a sophisticated attack on 60+ banks customer accounts via Internet Banking. Learn how it all went wrong and how to prevent it happening again.

Download PDF

How Secure is your Deviceless Authentication?

Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today.