Adaptive Multi-factor Authentication by SMS Passcode
Giving you heightened security, when needed.
A username and password are no longer enough to authenticate your users. Each day brings new stories of stolen identities and brands of all sizes falling victim to hackers. Weak or stolen user credentials are the preferred weapons used by hackers, and are behind approximately 76 percent of all network intrusions.
With Adaptive Multi-factor Authentication from SMS PASSCODE you are effectively taking the hackers preferred weapon away.
SMS PASSCODE leverages the one thing users always carry with them – their mobile phone. The solution provides a superior user experience by taking full advantage of contextual information such as login behavior patterns, geo-location, and type of login system being accessed.
With this information available the solution can assess the threat level and dynamically adjust the level of user authentication needed.
PortWise Signature Gateway by neXus Technology
Enabling web applications for digital signatures
Document signingPortWise Signature Gateway connects to the web application containing the data to be signed. A unique function makes it possible to create signable documents based on ordinary web forms. No need to reprogram every application.
Authenticate usersSigning with optional e-identities can be handled with built-in functions in PortWise Signature Gateway, e.g, it can manage the control of elective National eID (CA).
Document archivingWith PortWise Signature Gateway it is possible to save signed documents in a long-term archiving function included in the solution. The concept also contains functions for maintenance of signatures over time.
neXus Certificate Manager by neXus Technology
Production and administration of electronic credentials
By offering increased functionality and security to its users, Certificate Manager remains the industry’s most effective tool for PKI deployment. neXus Certificate Manager uniquely offers support for both soft and the widest possible set of physical tokens as a principal part of the CA solution and providing standards-based PKI security for user authentication and electronic signatures, the product enables customers to offer e-business services without compromising security.
neXus Certificate Manager is able to scale from the internal electronic ID deployment of small corporations, up to hundreds of hosted CAs, and manage millions of certificates with a proven ability to issue certificates at very high rates. neXus Certificate Manager will also integrate with external systems and data.
PortWise Authentication Server by neXus Technology
Strong authentication – easy to manage
PortWise Authentication Server is a software based solution that provides strong multi-factor authentication to applications and services. The PortWise solution is unique as it does not require the organization to purchase, distribute or maintain expensive hardware tokens for each user. Instead PortWise Authentication Server utilizes hardware that the end user already has, such as a mobile phone, PC, pager, or PDA, to deliver strong one-time passwords.
PortWise Authentication Server is based on leading industry standards to guarantee operability with existing applications and security infrastructures. Any application, router, firewall or gateway that supports RADIUS can utilize strong multi-factor authentication from PortWise. For non-RADIUS applications, PortWise Authentication Server provides a SOA interface based on web services.
YubiRADIUS by Yubico
Core YubiRADIUS features
YubiRADIUS is designed to be an easy to implement Proof-of-Concept for integrating the YubiKey.
YubiCloud by Yubico
Core YubiCloud features (free)
The YubiCloud is Yubico’s free YubiKey One Time Password Validation service. Anyone who wishes to use the YubiKey as a second authentication factor may use the YubiCloud to handle the validation, making adding the YubiKey Authentication even easier. All the necessary features for a fully realized YubiKey product are support at no cost to the user or implementer; Users can add use any YubiKey with any YubiCloud supported site! Further, the YubiRevoke Service ensures every YubiKey user can prevent access to any YubiCloud supported site with a lost or stolen Yubikey. Currently, the YubiCloud service handles hundreds of thousands of validations without any service downtime since 2010.
YubiHSM by Yubico
Core YubiHSM features
The security of any authentication solution is only as strong as the protections present on the server holding the secret keys for all of its users. When an authentication server is compromised, the security of all cryptographic keys and passwords stored on that server are also compromised. The YubiHSM is Yubico’s answer to server security. A USB Hardware Security Module, the YubiHSM is an easy to set-up and use hardware security solution for protecting authentication secrets stored on an authentication or login server. It can be quickly integrated with the YubiRADIUS solution for superior YubiKey authentication protection, or used as general purpose cryptographic toolbox for any application.
RSA Authentication Manager by EMC-RSA
RSA Authentication Manager: The central two-factor authentication software that provides capabilities to manage security tokens, users, multiple applications, agents, and resources across physical sites. Authentication Manager verifies authentication requests and centrally administers authentication policies for enterprise networks.
Provides easy and cost-effective management of your RSA SecurID solution through browser-based administration.
Supports two-factor authentication methods including hardware, software, and SMS to meet the needs of any user population.
Delivers a replication architecture that guarantees uptime of your critical security infrastructure.
Integrates with more than 400 of the industry’s leading partner solutions, including VPN, networking, wireless, firewall, and more.
Supports the most popular stand-alone operating system platforms, VMware virtual environments, and RSA SecurID Appliances pre-loaded.
Two-Factor Authentication by TeleSign
TeleSign two-factor authentication means users can protect themselves with the one thing they always have with them.
The Good Ol’ Password
The good old username and password are no longer good enough. To protect against account compromise, you need another layer of security. Along with their the username and password, users must add a second factor of authentication. But what? Email is insecure. Tokens and card readers are mislaid. Hardware solutions also involve you in a supply, replacement, and administration program 24/7
Easy to Use
Patented two-factor authentication (2FA) uses the one item that is most personal to the user. Something that is hardly ever out of arm’s reach—their phone. It’s a solution which requires no set-up, no training, and no extra hardware or software. In fact, phone-based authentication is so pervasive you’d be hard pressed to find someone out there, with at least an email account, who hasn’t experienced phone-based 2FA.
ActivID® by HID Global
Delivering a full range of flexible authentication and credentialing options that give businesses confidence in their users’ identities, the HID ActivID® IT Security portfolio protects access to everything from the cloud, to the data, to the door. HID Global’s ActivID product offering gives enterprises, financial institutions, governments, and healthcare organizations a single, coordinated view for logical and physical access, enabling them to efficiently manage various credentials for all of their different users, across all types of devices.
HID Global understands that each customer has different needs, and therefore requires a different solution. With that in mind, we offer multiple form factors and deployment options for our solutions, to effectively address every application.
SecurAccess by SecurEnvoy
Mobile phone based tokenless® Two Factor Authentication for VPN, SSL, Remote Desktop, WiFi, web portals, laptop encryption and other solutions. The modern alternative to physical fobs/tokens.
Mobile phone based Tokenless® two-step verification for remote access
Passwords aren't strong enough to protect company data from the other 3 billion users online. Two factor authentication provides the strength of security needed to protect you. By leveraging something the user already has, SecurAccess allows a seamless and cost effective solution for Two Factor authentication to be implemented.
Swivel Authentication Platform by Swivel Secure
The Swivel authentication platform, first launched in 2000, is used to secure VPN, desktops, web and Cloud-based applications.
Swivel’s range of risk based authentication tools helps enterprises manage the increasing data security risk posed by cloud services and bring your own device policies.
The Swivel platform delivers two factor authentication via mobile apps, SMS, OATH Tokens and interactive voice response channels and stronger authentication through integrated in-browser imagery.
AccessMatrix™ UAS by i-Sprint Innovations
AccessMatrix™ Universal Authentication Server (UAS) enables organizations to deploy a wide variety of authentication methods to address the business requirements for strong authentication and evolving authentication mechanisms, through a single, unified framework. AccessMatrix™ UAS is a future-proof authentication infrastructure. It supports multiple authentication mechanisms for strong authentication and authorization requirements. UAS enables organizations to rapidly deploy a wide selection of authentication methods to address their authentication requirements. Based on the proven AccessMatrix™ Integrated Security Architecture, UAS provides security Administration, Authentication, Authorization, and Audit services (4As) for business applications. 2FA implementations includes:
Supports for multiple authentication methods such as IDs/Passwords, dynamic passwords, certificates, biometrics, or security tokens is achieved through a simple Pluggable Authentication Module (PAM) approach. The selection of the authentication methods can be done without changing the source code of the application. Benefits include reduced cost, time to market and minimal effort for customization or “hardcode” of the application. With AccessMatrix™ UAS, multiple web applications and network devices allow access to a common set of security services via tight integration with the AccessMatrix™ security server.
SecureAuth Identity Provider™ (IdP) by SecureAuth
No product provides more to organizations in a single solution than SecureAuth IdP
With SecureAuth, organizations are able to enforce, restrict, and control access privileges of any user for corporate applications based on existing user credentials.
SecureAuth provides mechanisms for the generation, registration, validation, and revocation of X.509 digital identities (certificates) for the purpose of user access to web, mobile, network, and cloud resources on desktop or mobile devices. Without serious changes to infrastructures, enterprises can control the access granted to all users on any device to any target resource.
Because SecureAuth IdP integrates into existing infrastructures, all user information remains securely on-premises, and SecureAuth employs abstracted authentication to pull data required solely for authentication without storing this information away from the enterprise. SecureAuth supports numerous protocols for federation, including SAML, WS-Fed/Trust, OpenID, OAuth, and more; and utilizes HTTPS for protected transmission of data.
SecureAuth IdP is an all-inclusive solution, providing to enterprises flexible 2-Factor Authentication, transparent Single Sign-on, and comprehensive Identity Management tools.
2CHK® by Authentify
The Authentify 2CHK® Innovation
Authentify 2CHK® is an innovative transaction "authenticator". For financial services firms who must protect their customers from man-in-the-middle and man-in-the-browser attacks, 2CHK offers a secure communication channel to their customers via their phones, or a secure second channel to the user's desktop.
Authentify 2CHK will display transaction details for end user review and approval before final execution. If the details do not match what the user expected, the user can cancel the transaction via 2CHK.
Authentify 2CHK features:
IdentityGuard by Entrust
Strong Authentication & Identity Management Platform
All organizations — enterprises, governments or financial institutions — require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities.
While the demand for strong authentication has extended beyond traditional users, technology now exists that presents organizations with new opportunities to improve security, while reducing operating cost. These include physical and logical access solutions, digital certificates on mobile devices, soft tokens, advanced credentialing and more.
Existing point authentication solutions are no longer up to the task of thwarting advances that exploit vulnerabilities in a variety of channels or mediums. Whether the root threats originate from internal or external sources, critical information, data and identities are at constant risk.
Entrust’s flagship authentication solution, Entrust IdentityGuard leads the industry as one of the most robust authentication and identity-assurance platforms. It delivers an unmatched breadth of capabilities and flexibility to meet the most demanding security environments.
By leveraging a cost-effective platform to authenticate and manage digital identities, businesses can broaden their security deployment, provide flexibility for employees and partners, while achieving operating efficiencies and maximizing their return on investment.
Protect networks, applications, and data against unauthorized access
Symantec Validation and ID Protection Service is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers. A unified solution providing both two-factor and risk-based token-less authentication, VIP is based on open standards and can easily integrate into enterprise applications.
dualShield by Deepnet Security
If you are looking for an enterprise grade two-factor authentication system with strong security, powerful features, great flexibility, high availability and scalability, look no further.
Deepnet DualShield is a versatile two-factor authentication system that provides a wide range of authentication methods, integrates with all commonly used business applications our of the box, in a unified single platform.
Unlike most other two-factor authentication products in the market that provides only one or a few authentication methods, DualShield provides more than 10 authentication methods covering token-based, device based, biometrics as well as PKI certificates.
Unlike most other two-factor authentication products in the market that often integrates with a limited number of business applications, DualShield integrates with more than 10 enterprise and web applications covering VPN & RDP remote access, Windows, Mac and Linux OS Logon, Web & Cloud applications as well as Outlook emails.
DualShield is easily integrated with your xisting environment with minimum impact to your business operation. In the core of the DualShield unified authentication platform is the Deepnet Authentication Server that can be installed on any Windows or Linux server, or provided as a virtual appliance runing in a virtual server such as VMware or Sun Virtual Box.
With the broadest range of user authentication methods flexible role and policy based access control, single sign-on features, self-service portal, and proven performance to millions of users, DualShield enables organizations to reduce administration costs while providing secure access to their web applications and content.
SafeNet Authentication Manager by SafeNet
SafeNet Authentication Manager provides organizations with a comprehensive platform to manage the full authentication life cycle across the enterprise and extend strong authentication to the cloud using a single, integrated system.
Offering extensive management capabilities for SafeNet’s entire range of one-time password (OTP), certificate-based and software authentication solutions, context-based authentication and step-up authentication, SafeNet Authentication Manager enables organizations to address their current and evolving secure access needs.
SafeNet Authentication Manager Express (formerly SafeWord 2008) is an out-of-the-boxone-time password (OTP) two-factor authentication solution that enables secure remote access to your organization’s most sensitive and confidential resources.
With the push of a button, SafeNet Authentication Manager Express authenticators generate a highly secure, one-time password that can never be re-used, hacked, or compromised. The password’s two-factor authentication mechanism ensures that only properly authenticated users can access critical applications and data whether they reside in your data center, the cloud or virtualized environments.
IDConfirm 1000 by Gemalto
he IDConfirm 1000 solution includes all components needed to deploy strong authentication in your organization.
Using IDConfirm 1000, enterprises can deploy strong authentication for a low total cost of ownership.This is realized through packaged plug-and-play solutions that are adaptable to existing networks and AAA servers and built according to open OATH standards.IDConfim offers the highest level of security for two-factor authenticationYou can choose from a wide range of connected or unconnected form factors including smart cards, tokens, and a mobile OTP phone application.Our software solutions are open, scalable and evolutive.
ANAKAM.TFA by Equifax
Once users have access to a portal or applications, it is important to identify that the same users are returning in order to maintain security of the system and guard against account take-over, data loss and theft. Multifactor authentication is a simple yet secure way of knowing who is using your applications and ensuring that they are exactly who you expect them to be.
Our strong, multi-factor authentication product offers a range of layered, secure authentication methods in a single integrated platform. It delivers secure one-time passcodes via multiple vectors:
Out-of-band delivery of quickly expiring, one-time passcodes confirms that the person possessing the passcode is the one attempting to access your systems. Multiple authentication vectors ensure high-level security with user-required flexibility and usability.
If a biometric method is required or desired, two-factor authentication can also be done through voice biometrics – a secure, software-based method that doesn't require special hardware or detailed training.
Progressive authentication is our term for the best practice we pioneered—using an integrated set of tools and processes for situation-based authentication of known users seeking access to secure networks, data, and applications.
Based on your policy decisions, our solution will trigger authentication challenges at login or when suspicious transactions, unknown or risky devices, or out-of-norm behavior is recognized. These security authentication parameters can be customized in real-time for users both inside and outside your organization, progressively presenting authentication challenges based upon the latest threat assessment.
GridPro™ Authentication Solution by SyferLock
GridPro™ offers enterprises a software-based authentication solution to secure access to personal computers and tablets leveraging Microsoft’s Windows® operating system platform. The GridPro™ solution consists of a log-in application (replacing the standard Windows log-in) that presents the user with a software-based grid for secure, multi-factor authentication.
GridPro™ is supported on Windows laptops, desktops and servers.
GridGuard™ Authentication Solution by SyferLock
GridGuard™ software technology provides two-factor and multi-factor authentication for web portals, SSL VPN appliances and software applications for enterprises and governmental agencies. GridGuard’s™ flexible, adaptable solutions enable enterprises to cost-effectively address multi-factor authentication across a range of use cases and with a range of platforms.
GridGuard™ is deployed as a virtual appliance on the customer’s network. GridGuard™ integrates with the customer’s user registry to provide seamless user registration and authentication capabilities.
GridGuard™ supports the following deployment models—
•Grid2Form™ -- multi-factor authentication•GridAdvanced™ -- multi-factor authentication•GridLite™ -- multi-factor authentication•GridSoftToken™ -- two-factor authentication•Grid2Form™ + GridKey™ -- two-factor authentication
IDENTIKEY Appliance by Vasco Data Security
IDENTIKEY Appliance is designed as a convenience layer around VASCO’s IDENTIKEY Authentication server, giving organizations the option of running their Authentication server separate from all other systems and applications. Some organizations prefer this setup for security reasons or for the sake of minimizing implementation resources. Other companies choose this option to avoid sharing resources among crucial applications, opting instead for several dedicated appliances. IDENTIKEY Appliance is a plug-and-play solution that can be installed very quickly and easily, all without impacting the performance of existing systems and applications.
IDENTIKEY Appliance is scalable up to 100,000 users and, as such, is suited for medium to large enterprises. It comes preloaded with the latest IDENTIKEY Authentication server, VASCO’s back-end authentication software that powers DIGIPASS Two-factor authentication and supports the entire family of DIGIPASS client authentication devices and functionalities, including one-time passwords, e-Signatures, DIGIPASS for Mobile and software-only authentication.
IDENTIKEY Appliance offers standard RADIUS support as well as optional integration through a SOAP API.
Detailed information on users, DIGIPASS and policies is stored either in an embedded database inside the appliance or through ODBC in an available database on the network.
IDENTIKEY Authentication Server by Vasco Data Security
IDENTIKEY Authentication server is VASCO’s off-the-shelf centralizedAuthentication server. It is the perfect choice to secure remote access to corporate resources and various types of (web-based) applications, from remote access and SSL VPN to SaaS.
The solution is straightforward and scalable; fit to accommodate the needs of both large and small implementations. It offers complete functionality and management features without the need for significant budgetary or personnel investments. This results in a fast and cost-effective rollout.
IDENTIKEY Authentication server supports Windows and Linux operating systems on 32 bits and 64 bits platforms.
MYDIGIPASS.COM by Vasco Data Security
MYDIGIPASS.COM™ from VASCO® is a cloud-based, Two-factor authenticationservice that provides a secure login to your web applications.
The foundation of MYDIGIPASS.COM is to leverage highly-secure technology, then make it easy to use and cost effective to deploy and manage.
Users can securely login by generating aone-time password (OTP) by scanning a Quick response (QR) code with their mobile devices, authenticating via the embedded DIGIPASS in Intel® Identity Protection Technology (Intel® IPT) on their laptops, or by using one of the 100 million DIGIPASS hardware tokens in the field.
DIGIPASS as a Service by Vasco Data Security
DIGIPASS as a Service is VASCO’s cloud based authentication service which makes use of VASCO’s proprietary authentication technology. ASP’s can secure their entire infrastructure with DIGIPASS as a Service. Web application providers can focus on their core business while VASCO takes care of all aspects of securing their network and applications in a service model.
VACMAN Controller by Vasco Data Security
VACMAN Controller is a state-of-the-art API-based authentication platform that serves as a back-end for DIGIPASS strong authentication. It automatically processes login requests to ensure only properly authenticated users obtain access to protected online applications. A unique design, unlimited scalability and versatile flexibility make VACMAN Controller a perfect fit for large deployments in a variety of customer interfacing applications. Benchmarked at 9,000+ authentications per second, it is capable of processing heavy volumes of authentication requests and can support mass deployments in applications such as online banking, e-commerce, online gaming, web portals and more.
DS3 Authentication Server by DS3
In face of the ever-changing threat landscape, businesses, institutions and end users are confronted by increased uncertainty and fear of fraud and abuse. Theft of information and electronic data has superseded physical theft as the most frequently reported fraud. With the increased use of technology in businesses, fraudsters have more opportunities to attack enterprises with more advanced tools of their own. Enterprises need to stay agile and responsive to new industry standards and compliance requirements without overhauling their existing infrastructure and investment.
A strong, comprehensive, flexible and cost-effective solution needs to be in place to meet current and future needs. Stretching the dollar without compromising on security, speed of deployment, features, and user experience are the key concerns of any security professional.
Multi-Factor Authentication with End-to-end Encryption
The DS3 Authentication Server appliance is a high performance appliance that provides multifactor authentication with end-to-end encryption of keys protected by a FIPS-certified Hardware Security Module (HSM).
Future-proof your investment with our agile and highly customizable solutions. Our authentication solutions provide multifactor authentication with a wide variety of hardware and software tokens, allowing flexibility of token deployment without the fear of vendor lock-in. Together with end-to-end encryption and transaction authorization, enterprises are able provide customers with a peace of mind, which can translate into increased confidence, trust and loyalty towards the business.
Azure Multi-Factor Authentication by Microsoft
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access. Azure Multi-Factor Authentication can be used for both on-premises and cloud applications.
Get security and convenience
Azure Multi-Factor Authentication helps safeguard access to your data and applications while addressing user demand for a simple sign-in process. The service offers enhanced protection from malware threats, and real-time alerts notify your IT department of potentially compromised account credentials. Multi-Factor Authentication delivers strong authentication via a range of easy options, including mobile apps, phone calls, and text messages, allowing users to choose the method that works best for them. Support for multiple methods ensures that users can always be reached for additional authentication.
Add it to on-premises applications
Use the Multi-Factor Authentication Server to enable additional authentication for on-premises applications such as remote access VPNs and web applications, as well as cloud applications using Active Directory Federation Services. Sync with Server Active Directory or another LDAP directory to streamline user management. Run the Multi-Factor Authentication Server on your existing hardware or in a Azure Virtual Machine. Multiple, redundant servers can be configured for high availability and fail-over.
Turn it on for Azure Active Directory (Azure AD)
Use Multi-Factor Authentication to secure access to Azure, Microsoft Online Services like Office 365 and Dynamics CRM Online, and thousands of Non-MS Cloud services preintegrated with Azure AD. Simply enable Multi-Factor Authentication for Azure AD identities, and users will be prompted to set up additional verification the next time they sign in. Azure Multi-Factor Authentication is also included in Azure Active Directory Premium offering.
Build it into your applications
A Software Development Kit (SDK) enables direct integration with your cloud services. Build Multi-Factor Authentication phone call and text message verification methods into your application’s sign-in or transaction processes and leverage your application’s existing user database.
CA Advanced Authentication by CA Technologies
Combines multi-factor credentials and risk evaluation to help avoid inappropriate access and fraud.
Concern about identity theft, data breaches and fraud is increasing but at the same time organizations are feeling pressure to enable employees, partners and customers to access more sensitive information from anywhere and any device. These market dynamics make multi-factor authentication and fraud prevention critical parts of any organization’s security strategy.
CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geolocation and user activity, as well as, a wide variety of multi-factor, strong authentication credentials. This solution can allow the organization to create the appropriate authentication process for each application or transaction. It can be delivered as on-premise software or as a cloud service and it can protect application access from a wide range of endpoints including all of the popular mobile devices. This comprehensive solution can enable your organization to cost effectively enforce the appropriate method of strong authentication across environments without burdening end users.