If you were a hacker, will you try and beat the perimeter security of an organization or target the user base that may not be security conscious
AuthShield security team has always been focused on innovating and creating the latest technology and solutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology.
The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organization in the world in less than two hours!! With aulti-tenant architecture client has a centralized management system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database.
With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features.
- AuthShield offers its users the most convenient Two Factor Authentication
- solution ever!
- Simple and easy set up
- Choose from among multiple form factors available
- Works in all scenarios
- Cost effective, reliable and secure
AuthShield Authentication Manager - Overview
AuthShield Authentication Manager is used to manage the entire Two-factor Authentication portfolio of an organization. A single unified view gives access to the complete functionality of the system. Access and privileges are strictly defined to ensure security of the management panel. The management panel can be used to manage the entire Two Factor Authentication environment in the organization including –
- Creation of different Applications and domains for Multi-level architecture
- Integration with Active Directory
- Managing and Assigning tokens (Hard/Mobile/Soft/Push/SMS) to users
- Locking and unlocking users / tokens
- Creating and assigning user group policies
How it works
AuthShield’s second form of authentication works in multiple ways. The user initially enters his user name and password as always. Once the primary password is authenticated, the user is prompted to enter his One Time Password. The One Time password could be generated using AuthShield Mobile Token, AuthShield Hard Token, AuthShield Soft Token or the user could use AuthShield Push Token to authenticate via any of the smart phones including iPhone, Blackberry, Android devices, Windows phones etc. For old handsets, user could opt for SMS / Call Token to authenticate. 8AuthShield supports diverse user bases by allowing users to authenticate with whatever form factor suits most. Some users prefer AuthShield Mobile authentication (AuthShield Push, AuthShield Mobile Token, SMS / Call token) while other prefer to authenticate via a hard or soft token. Support for multiple methods ensures that users can always be reached for additional authentication.
The entire authentication process is transparent where the primary password of the user is never visible to AuthShield server. AuthShield server only receives the user name and one time password thereby ensuring users privacy.
AuthShield can be integrated with multiple integration points including VPN, Web applications, Unix / SSH, corporate mail, desktop mail clients etc in less than thirty minutes.
AuthShield uses its multiple servers hosted around the world to ensure fail over and High Availability across the client spectrum. The servers are hosted by ISO 27001 certified data centers with Disaster Recovery and Business Continuity.