Cryptomathic

Authenticator

Multi-Factor Authentication

The rise in on-line attacks, e.g. phishing and Trojans has led organisations to seek new ways of securing internet / telephone channels resulting in strong two-factor authentication - providing a long-term, strategic solution.

The Authenticator is a multi-factor authentication server designed for scalable applications, such as eBanking and eGovernment, with full support for a wide range of tokens to seamlessly match the current and future security needs of all users.

Authentication Mechanisms

  • CAP / DPA
  • VISA CodeSure
  • Digital signatures
  • Matrix cards
  • OATH (HOTP / TOTP / OCRA)
  • OTP proprietary tokens (e.g. Vasco)
  • Pattern recognition
  • PKI
  • Secure fax
  • Smart phone applications (e.g. Cryptomathic)
  • SMS OTP
  • Static & partial user name and password
  • TAN lists

Multiple Authentication Methods

Smart Phone Applications

To complement its robust offering in strong authentication and digital signatures, Cryptomathic offers a range of user-friendly one-time-password(OTP) smart phone applications that generate dynamic passwords on a variety of devices starting with Google Android, Apple iOS and Backberry platforms.

The Cryptomathic Mobile AuthApp security suite is based upon industry standards such as OATH event-based(HOTP), time-based(TOTP), challenge response(OCRA) or MasterCard CAP / VISA DPA algorithms. The solution is fully integrated with our back-end solutions Authenticator and Cryptomathic Signer.

End-to-end Security

The Authenticator provides a much more secure and comprehensive solution than other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:

  • HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
  • Attack detection, e.g. invalid authentication attempts
  • Administrator Security - remote admin client, chip card log-on, separation of duties and dual controls
  • Audit logs, including usage log and security log
  • Database, e.g. HSM encryption

Flexible & Future Proof

Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:

  • Internal Attack
  • Man-In-The-Browser
  • Man-In-The-Middle
  • Mining
  • Pharming
  • Phishing
  • Social Engineering
  • Trojan

Authenticator Angler fish

Scalability

The Authenticator is scalable and is used by customers for managing anywhere from a few hundred users to several million.
The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:

  • Fail-over, e.g. back-up or disaster recovery
  • Clustering
  • Load balancing across servers and HSMs

Return on Investment

Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in, ensuring the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.

Click here to compare the pros and cons of authentication mechanisms to best suit your requirements or contact us for futher information.

 

On-line Demo

Please visit our on-line demo by clicking the image or link below to experience a multiple of user authentication mechanisms.

Authenticator Demo

VISIT THE DEMO

at

https://authdemo.cryptomathic.com/

 

Authenticator Video