SECURITY THAT WORKS FOR PEOPLE
CypherKey authenticators, provide organizations with a variety of single factor, two-factor and three-factor authentication options to protect data at the device through proving user presence.
Hardware Token Authentication
Using a separate hardware token is considered one of the most secure authentication methods as they are not internet connected.
This method is more expensive, although its costs provide a clear ROI for high security scenarios.
Software Token Authentication
By using an authentication application on a mobile device, you can significantly increase the security and access controls while making deployment simple.
Biometric Verification
People with a smart device or computer with biometric authentication (such as fingerprint ID or facial recognition) can use this check to confirm their identity as part of MFA.
CypherAuth is a smartphone application that uses the knowledge factor (user secret) and is based on One-Time-Pad principles making the application highly secure, simple and scalable.
CypherAuth allows users to easily verify their real world credentials and identity, register their mobile device as a token and create a secure and secret PIN.
As CypherAuth does not use an algorithm it is by its nature a quantum resistant method of authentication.
A user can complete all their steps in a way that enables your organisation to meet both identity proofing and legal compliance requirements.
Users can also add their credentials as required by your organizations business rules.
In addition to possible deployment to legacy feature phone platforms via SMS, deployment is also supported across iOS, Android smartphones with operating systems support for older devices.
-
Users can verify their identity with a range or services and in a number of ways, ranging from email, sms to an online identity check to the level required by the security controls.
-
Datasec works with existing identity management systems to ensure that users are controlled the organisations system of choice.
-
Authentication requirements are conditional and based on the security controls of the site, system of file being accessed. From simple and frictionless token use to strong three factor authentication.
SMARTPHONE APPLICATION
SECURE SMS
Deploying a single SMS solution across all use cases and channels significantly reduces the cost and complexity of deployment.
Furthermore, unlike many SMS solutions which are often a patchwork of disparate technologies, Cypher SMS, ensures a simpleand clear user experience through its common use of the ciphered secret (zero knowledge password proof) across all interactionsor as the underlying component on which other solutions are built.
The simple deployment of CypherSMS ensures organizations can easily scale to large user groups with minimal onboarding.
With CypherSMS the insecurity of the SMS channel is irrelevant as the secret OTP is never sent via SMS. Rather, CypherKey sends a cipher key which allows the user to encode their secret PIN into a different letter code each time they authenticate.
Even if intercepted, the CypherKey does not provide an attacker with a means to compromise that user or any other aspects ofthe system.
The CypherCard is a military grade authentication device which enables employees to authenticate to physical assets(such as printers or doors) as well as systems or apps used on-a-daily-basis with one simple solution.
The credit card sized device caters to every authentication challenge a user might experience and ties these back to the corporate identity management system. This means that any change to the persons security level status, takes immediateeffect without the need to propagate the change across multiple systems.
Possession Factor – The Card
The convenience of a credit card sized device makes CypherCard a perfect device to keep in a wallet or on the back of the smartphone to safeguard any transactions on mobile devices, physical access or corporate systems.
Biometric – Local Fingerprint
Each card is linked to the finger-print of the user, and once registered the card can only be used by the registered and authorised owner.
Knowledge Factor – The User
CypherCard uses a patented adaption of the tried and tested One-Time-Pad principles. By converting their secret into a unique code each-time they authenticate,
-
Benefit from trusted identities, ensuring that digital and physical access is restricted to authorised individuals.
-
Enable seamless compliance with regulations around access to sensitive data, including HIPAA, GDPR, PCI-DSS and more.
-
Future-proof your organizations credentials with solutions designed to work well with both legacy systems and emerging cybersecurity evolutions.
-
Go beyond multi-factor authentication (MFA) and open does with an authenticator investment that includes digital signing, data encryption, and physical access functionality