Do you find your IT security requirements becoming more and more complex? Do you need to secure remote access from many different types of devices? A growing number of users and different apps? Concerns about the suitability of passwords to secure access to enterprise information? We have a systematic flexible and cost-effective approach to meet many authentication requirements.

Secure. Comply. Replace.

Authlogics provides a three-step journey to enable IT managers to improve end-to-end security. We can ensure that all passwords comply with the latest regulations and guidance. Authlogics can secure medium and high-risk end-points by adding an additional factor of security. This enables organisations to begin to move away from password-based login mechanisms, as well as the following benefits:

  • Remove / reduce the reliance on passwords
  • Relieve pressure on the helpdesk for password resets
  • Ensure regulatory compliance and mitigate risk
  • Provide flexible, secure and cost effective authentication options
  • Improve user and customer experience with simple, memorable logon

Ensure Compliance

General Data Protection Regulation (GDPR) and  NYDFS Cybersecurity Regulation (23 NYCRR 500) legislation have forced companies to re-evaluate their corporate processes, especially with regards to security. A breach or failure to comply could lead to large fines and the publicity could cause loss of customer revenue.

Find out how legislation impacts corporate security policy and what can be done to improve compliance.

Passwords have become ubiquitous in their use to secure access to computer systems, yet they are far from perfect from a usability and security point of view. Recent guidelines address these issues by reducing both the complexity of passwords and the frequency that users need to change them. Whilst the ultimate goal may be to replace passwords, for now, we can improve how they used.

Discover how implementing these guidelines can improve password security and bring other benefits too.

Secure with Multi-Factor Authentication

Device-less or 1.5 Factor authentication delivers a one time code solution without the need for a separate physical device. Traditionally all one time code systems had to be two factor solutions and the codes were displayed on the second physical factor.

With 1.5 factor authentication, a challenge is displayed directly on screen which only the user would know how to respond to – without the need for a PIN, password or second device.

Two Factor authentication is defined by “something you know” and “something you have”. Security is improved by requiring a device dependant one time code to augment a username and password.

Our solution contains multiple innovative and flexible two factor authentication types. We offer industry standard OATH technology delivered via SMS/TEXT or soft token, phrase-based authentication as favoured by online banking websites, or our patented pattern-based solution.

Use Three Factor authentication in high risk environments such as online payments, when “something you know” and “something you have” isn’t enough.

Transaction signing adds a factor of “something you are doing” into a transaction ensures that the one time code you supply can only be used for the purpose it was intended – once only, and not by anyone else.

Replace Passwords

Removing passwords from the login process leads to cost reductions and a better experience for both users and customers. With fewer calls to the help desk due to lockouts and password resets, costs are cut and productivity is increased. Alternatives to passwords also improve the security of processes where passwords have never been a viable authentication approach.

Have you ever received a phone call from somebody claiming to be from your bank or utility company? They need to verify your identity, but you can’t be certain they say who they are. Neither side can exchange sensitive information without a password or other suitable authentication mechanism.

Two Way Id provides both parties the assurance that they are speaking to the person authorised to modify information or process a transaction. It creates vital trust over the phone or remote connection without divulging personal information to either party.

The banking industry uses a variety of methods to authenticate their customers; they vary from a simple username and password through to dedicated bio-metric hardware solutions. However these solution have limited success, and create a poor user experience for customers.

Deploying Authlogics in a retail banking environment offers a single simple way to authenticate a customer in multiple banking scenarios from online and telephone banking, hardware based solutions such as ATM / cash machines, and even bank statements.