Strong authentication provides a long-term, strategic solution for protecting against online attacks, such Phishing, Trojans, etc.

    Authentication is all about ensuring that the right individual has the right access to the right function at the right time. But authentication is also about having the latest knowledge and most secure strategy as crooks are never more than one step behind.Cryptomathic delivers the complete solution or individual components for implementing large-scale strong authentication services.

    The Cryptomathic Authenticator is a Multi-Factor Authentication server designed for scalable applications, such as eBanking and eGovernment, with complete support for a wide range of tokens to seamlessly match the current and future security needs of all user segments.

     

    Authenticator-Square-2.png

    Multi-Factor
    Authentication

    • CAP / DPA
    • VISA CodeSure
    • Digital signatures
    • Matrix cards
    • OATH (HOTP / TOTP / OCRA)
    • OTP proprietary tokens (e.g. Vasco)
    • Pattern recognition
    • PKI
    • Secure fax
    • Smart phone applications (e.g. Cryptomathic)
    • SMS OTP
    • Static & partial user name and password

    Authentication

    End-to-end Security

    The Authenticator provides a much more secure and comprehensive solution than any other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:

    • HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
    • Attack detection, e.g. invalid authentication attempts
    • Administrator Security - remote admin client, chip
    • Card log-on, separation of duties and dual controls
    • Tamper evident audit logs, including usage log and security log
    • Database, e.g. HSM encryption

    Flexible &
    Future Proof

    Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:

    • Internal Attack
    • Man-In-The-Browser
    • Man-In-The-Middle
    • Mining
    • Pharming
    • Phishing
    • Social Engineering
    • Trojan

    Authentication

    Scalability

    The Authenticator is scalable and is used by customers for managing anywhere from a few thousand users to several million.

    The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:

    • Fail-over, e.g. back-up or disaster recovery
    • Clustering
    • Load balancing across servers and HSMs

    Authenticator
    Return on Investment

    Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in.

    This ensures the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.

    AUTHENTICATOR VIDEO

    A flexible authentication experience

    See how Authenticator provides the most flexible approach to choosing different authentication mechanisms for all users with various protection profiles.

    Play

    Try out our on-line interactive demo

    This demo shows how Cryptomathic Signer leverages strong authentication to deliver user-friendly and legally binding digitally signed transactions over the web.

    LEARN MORE

    Case Study

    See why Permanent TSB chose authenticator as their strategic solution for nationwide deployment.

    White Paper

    Explore how to use exisiting 2FA systems to deliver centralised e-signatures in accordance with eIDAS.

    Resources

    At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.