Do you find your authentication security requirements becoming more and more complex? Do you need to secure remote access from many different types of devices? A growing number of users and different apps? Concerns about the suitability of passwords to secure access to enterprise information? We have step-by-step and cost-effective authentication solutions to solve many authentication problems.
Authlogics provides a three-step journey to enable IT managers to improve end-to-end security. We can ensure that existing passwords and policy comply with the latest regulations and guidance. Authlogics can further secure medium and high-risk end-points by adding an additional factor of security. Finally, we empower organisations to move away from password-based login mechanisms to a password-less world:
- Remove / reduce the reliance on passwords
- Relieve pressure on the helpdesk for password resets
- Ensure regulatory compliance and mitigate risk
- Provide flexible, secure and cost effective authentication options
- Improve user and customer experience with simple, memorable logon
Passwords have become ubiquitous in their use to secure access to computer systems, yet they are far from perfect from a usability and security point of view. Recent guidelines address these issues by reducing both the complexity of passwords and the frequency that users need to change them. Whilst the ultimate goal may be to replace passwords, for now, we can improve how they used.
Discover how implementing these guidelines can improve password security and bring other benefits too.
The Authlogics Password Breach Database is a key component when looking to meet the new password policy guidelines set by NIST SP 800-63B. It provides a comprehensive and well maintained dictionary of unacceptable and compromised passwords in the cloud for real-time lookups.
Find out how the Password Breach Database can help you simplify your password headache.
General Data Protection Regulation (GDPR) and NYDFS Cybersecurity Regulation (23 NYCRR 500) legislation have forced companies to re-evaluate their corporate processes, especially with regards to security. A breach or failure to comply could lead to large fines and the publicity could cause loss of customer revenue.
Find out how legislation impacts corporate security policy and what can be done to improve compliance.
Secure with Multi-Factor Authentication
Deviceless or 1.5 Factor Authentication delivers a One Time Code solution without the need for a separate physical device. Traditionally all One Time Code systems had to be two factor solutions and the codes were displayed on the second physical factor.
With 1.5 Factor Authentication, a challenge is displayed directly onscreen which only the user would know how to respond to – without the need for a PIN, password or second device.
Two-Factor Authentication is defined by “something you know” and “something you have”. Security is improved by requiring a device dependant One Time Code to augment a username and password.
Our solution contains multiple innovative and flexible Two-Factor Authentication types. We offer industry standard OATH technology delivered via SMS/TEXT or soft token, phrase-based authentication as favoured by online banking websites, or our patented pattern-based solution.
Use Transaction Signing or Three-Factor Authentication in high risk environments such as online payments, when “something you know” and “something you have” isn’t enough.
Transaction signing adds a factor of “something you are doing” into a transaction ensures that the One Time Code you supply can only be used for the purpose it was intended – once only, and not by anyone else.
Removing passwords from the login process leads to cost reductions and a better experience for both users and customers. With fewer calls to the help desk due to lockouts and password resets, costs are cut and productivity is increased. Alternatives to passwords also improve the security of processes where passwords have never been a viable authentication approach.
Have you ever received a phone call from somebody claiming to be from your bank or utility company? They need to verify your identity, but you can’t be certain they say who they are. Neither side can exchange sensitive information without a password or other suitable authentication mechanism.
Two-Way ID provides both parties the assurance that they are speaking to the person authorised to modify information or process a transaction. It creates vital trust over the phone or remote connection without divulging personal information to either party.
The banking industry uses a variety of methods to authenticate their customers; they vary from a simple username and password through to dedicated bio-metric hardware solutions. However these solution have limited success, and create a poor user experience for customers.
Deploying Authlogics in a retail banking environment offers a single simple way to authenticate a customer in multiple banking scenarios from online and telephone banking, hardware based solutions such as ATM / cash machines, and even bank statements.
Removing passwords from the login process leads to cost reductions and a better experience for both users and customers. This allows you to reduce costs with fewer calls to the help desk due to lockouts and password resets, and improve productivity. Alternatives to passwords also improve the security of processes where passwords have never been a viable authentication approach.
Utilising public cloud services like Microsoft Azure and Office 365 have many business advantages compared to traditional on-prem solutions, however, they also create more opportunity for intruders to access critical corporate information. Adding Multi-Factor Authentication is critical to improving the security of these applications, but can create complex and varied authentication processes within an organisation.
Find out how our solution provides secure, trusted and consistent authentication experience across the entire enterprise.
Amazon Web Services (AWS) is a market leading cloud provider used by many organisations for application and server hosting both applications and servers. Locating corporate infrastructure offsite, outside of the local network, with third-party management introduces new risks that need to be mitigated.
Authlogics for Amazon Web Services provides comprehensive Multi-Factor Authentication and Single Sign-On capabilities for infrastructure located on AWS.