SECURITY THAT WORKS FOR PEOPLE

CypherKey authenticators, provide organizations with a variety of single factor, two-factor and three-factor authentication options to protect data at the device through proving user presence.

Hardware Token Authentication

Using a separate hardware token is considered one of the most secure authentication methods as they are not internet connected. 

This method is more expensive, although its costs provide a clear ROI for high security scenarios.

Software Token Authentication

By using an authentication application on a mobile device, you can significantly increase the security and access controls while making deployment simple.

Biometric Verification

People with a smart device or computer with biometric authentication (such as fingerprint ID or facial recognition) can use this check to confirm their identity as part of MFA. 

CypherAuth is a smartphone application that uses the knowledge factor (user secret) and is based on One-Time-Pad principles making the application highly secure, simple and scalable.

CypherAuth allows users to easily verify their real world credentials and identity, register their mobile device as a token and create a secure and secret PIN.

As CypherAuth does not use an algorithm it is by its nature a quantum resistant method of authentication.

A user can complete all their steps in a way that enables your organisation to meet both identity proofing and legal compliance requirements.

Users can also add their credentials as required by your organizations business rules.

In addition to possible deployment to legacy feature phone  platforms via SMS, deployment is also supported across iOS, Android smartphones with operating systems support for older devices.

  • Users can verify their identity with a range or services and in a number of ways, ranging from email, sms to an online identity check to the level required by the security controls.

  • Datasec works with existing identity management systems to ensure that users are controlled the organisations system of choice.

  • Authentication requirements are conditional and based on the security controls of the site, system of file being accessed. From simple and frictionless token use to strong three factor authentication.

SMARTPHONE APPLICATION

SECURE SMS

Deploying a single SMS solution across all use cases and channels significantly reduces the cost and complexity of  deployment.

Furthermore, unlike many SMS solutions which are often a patchwork of disparate technologies, Cypher SMS, ensures a simpleand clear user experience through its common use of the ciphered secret (zero knowledge password proof) across all interactionsor as the underlying component on which other solutions are built.

The simple  deployment of CypherSMS ensures organizations can  easily scale to large user groups with minimal onboarding.

With CypherSMS the insecurity of the SMS channel is  irrelevant as the secret OTP is never sent via SMS. Rather,  CypherKey sends a cipher key which allows the user to  encode their secret PIN into a different letter code each time  they authenticate.

Even if intercepted, the CypherKey does  not provide an attacker with a means to compromise that  user or any other aspects ofthe system.

The CypherCard is a military grade authentication device which enables employees to authenticate to physical assets(such as  printers or doors) as well as systems or apps used on-a-daily-basis with one simple solution.

The credit card sized device caters to every authentication challenge a user might experience and ties these back to the corporate identity management system. This means that any change to the  persons security level status, takes  immediateeffect without the need to propagate the change across multiple systems.

Possession Factor – The Card

The convenience of a credit card sized device makes CypherCard a perfect device to keep in a wallet or on the back of the smartphone to safeguard any transactions on mobile devices, physical access or corporate systems.

Biometric – Local Fingerprint

Each card is linked to the finger-print of the  user, and once registered the card can only be used by the registered and authorised owner.

Knowledge Factor – The User

CypherCard uses a patented adaption of the tried and tested One-Time-Pad principles.  By converting their secret into a unique code each-time they authenticate,

  • Benefit from trusted identities, ensuring that digital and physical access is restricted to authorised individuals.

  • Enable seamless compliance with regulations around access to sensitive data, including HIPAA, GDPR, PCI-DSS and more.

  • Future-proof your organizations credentials with solutions designed to work well with both legacy systems and emerging cybersecurity evolutions.

  • Go beyond multi-factor authentication (MFA) and open does with an authenticator investment that includes digital signing, data encryption, and physical access functionality

Three Factor Authentication Card