- info@satcominfotech.com
- +91 22 49621040/41
Auth Shield
Auth Shield
Authshield is a Multifactor authentication Solution working at protocol layer
- Easy User Provision - Organizations can use Active Directory Synchronization to quickly provision an existing user database. Or, use bulk user imports with CSV files
- Adaptive Authentication - End users are identified by their behavioral patterns that go beyond users ID and password - and behavioral templates grow more accurate with each login
- Improved Protection and User Experience - Authshield Multi-factor authentication with customizable adaptive workflows and unparalleled protection that doesn’t get in the way of user experience
- Secure everything - Authshield integrates easily with your existing VPN, on-premises and cloud apps, SAP and Corporate Mails.
Our Products
- Fingerprint Biometric - Authshield uses a proprietary fingerprint recognition technology that helps authenticate users in an instant with a touch of their finger ensuring security and convenience.
- Facial Biometric - The most convenient and advanced method which uses Artificial Intelligence enabled next generation Facial Recognition technologies to grant user's access to their secured data.
- Hard Token - Hard tokens generates a new password after fixed intervals of time. Each device is in sync with the server, based on Time i.e. the server uses the same algorithm to validate the passwords entered by the user at that point in time
- Desktop Token - - Desktop tokens are TOTP (Time Based One Time Passwords) tokens installed on systems which generate an OTP on the device itself to augment the security apart from entering his username and password. The password is based on a predefined unbreakable randomized algorithm.
- One Touch - Anytime a user attempts to login, AuthShield Push server pushes a notification with login details to the user’s registered device. The notification allows the user to ‘Approve’ or Deny’ the request. The token replaces ‘seed’ based token with a challenge response architecture based on PKI.
- SMS/ Mobile token - The user enters the password generated by the mobile token as a secondary form of authentication. The device is highly popular among users with smart phones as it ensures that the user does not need to carry any extra devices to apart from his mobile phone to authenticate himself.
Satcom Infotech © 2024 / ALL RIGHTS RESERVED