DEVICE AUTHENTICATION
Hardware-based device fingerprinting resilient to
cloning,
malware and device jailbreak/root. Hardware-level control
over the displayed UI independent of the device operating system.
Hardware-level data protection.
USER AUTHENTICATION
Verify the identity of users for
access control with
contemporary biometric connected MFA security tokens.
TRANSACTION AUTHENTICATION
High assurance out-of-band
authentication of high impact
transactions and instructions initiated through electronic
service delivery channels. Audit trail of verification for
non-repudiation. Fraud protection against man-in-the-middle
and browser malware.
CONTEMPORARY
AUTHENTICATION METHODS
Echidna authentication
server to enable adaptive risk-based approach to security through
a range of methods for different levels of authentication assurance from SMS OTPs,
Challenge/Response, to more contemporary QR code signing and advanced connected mobile
security tokens capable of transaction signatures with dynamic linking of the transaction
context and addition of PIN, Fingerprint and other biometrics.
HSM SOLUTIONS
Reseller of Thales nShield
HSMs with professional
services and subject matter expertise in HSMs, key ceremony
procedures, and SEE code development.
CLOUD & IOT SECURITY
Secure the identity and
access of users, devices and Internet of
Things
connecting into the cloud. Support cloud
adoption and migration of applications and data into private and public clouds.