LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

Similar documents
LinQ2. Secure Messaging Gateway. Direct Communication to your customers

deep (i) the most advanced solution for managed security services

Cloud sicherung durch Adaptive Multi-factor Authentication

Authlogics for Azure and Office 365

Flexible, robust, easy and thorough authentication

Keeping your VPN protected. proven. trusted.

Whitepaper on AuthShield Two Factor Authentication with SAP

Keeping your VPN protected

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Yubico with Centrify for Mac - Deployment Guide

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

The only authentication platform you ll COVER. ever need.

The only authentication platform you ll

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Google Identity Services for work

SxS Authentication solution. - SXS

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

AS emas emudhra Authentication Solution

Ling Hsieh 謝姈諺 Deputy Sales Manager/ Marketing Department

Two-factor Authentication: A Tokenless Approach

AKAMAI CLOUD SECURITY SOLUTIONS

We Believe: The market will soon require:

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Keep the Door Open for Users and Closed to Hackers

BlackBerry 2FA. Datasheet. BlackBerry 2FA

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

SurePassID ServicePass User Guide. SurePassID Authentication Server 2017

Introduction. The Safe-T Solution

Echidna Concepts Guide

Secure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security.

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0

THE SECURITY LEADER S GUIDE TO SSO

How Next Generation Trusted Identities Can Help Transform Your Business

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

NEVIS Smart Solutions against sophisticated attackers

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

Is Your Online Bank Really Secure?

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

Google on BeyondCorp: Empowering employees with security for the cloud era

Next Generation Authentication

Authentication Technology for a Smart eid Infrastructure.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Best Practices Guide to Electronic Banking

Integrated Access Management Solutions. Access Televentures

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

DIGIPASS Authentication for Cisco ASA 5500 Series

Security Strategy for Mobile ID GSMA Mobile Connect Summit

1. Introduction. 2. Why Mi-Token? Product Overview

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

DIGIPASS Authentication for Check Point VPN-1

New Paradigms of Digital Identity:

Enterprise Guest Access

SurePassID Local Agent Guide SurePassID Authentication Server 2016

Safelayer's Adaptive Authentication: Increased security through context information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

RHM Presentation. Maas 360 Mobile device management

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Duo End User Education Templates

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

SAP Security in a Hybrid World. Kiran Kola

ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

Advanced Authentication 6.0 includes new features, improves usability, and resolves several previous issues.

Building the Business Case for Strong Authentication

FEITIAN Technologies, Co., Ltd.

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

white paper SMS Authentication: 10 Things to Know Before You Buy

Securing Your Most Sensitive Data

Mobile Security / Mobile Payments

Moser Baer Group 25 years of excellence

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

SRX als NGFW. Michel Tepper Consultant

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security

Two Factor Authentication

Software Token Enrollment: SafeNet MobilePASS+ for Apple ios

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Choosing the right two-factor authentication solution for healthcare

DIGIPASS Authentication for F5 BIG-IP

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

DIGIPASS Authentication for O2 Succendo

The specifications and information in this document are subject to change without notice. Companies, names, and data used

Comodo Certificate Manager

Enabling Compliance for Physical and Cyber Security in Mobile Devices

How to Secure SSH with Google Two-Factor Authentication

4TRESS AAA. Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook. Document Version 2.3 Released May hidglobal.

Quick Heal Mobile Device Management. Available on

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Are You Flirting with Risk?

MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012

Transcription:

LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network

LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable for all industries Government, Banks, Public, Retail etc Enhanced security against fraud with two factor authentication via SMS to authorize or access to sensitive corporate data. LinQ2 Factor with SMS can provide guarantees against the risk of attack from malicious software or phishing attacks. LINQ2FA is a two factor authentication SMS Token (One Time Password) LinQ2FA Stay Fraud Free! system based on something you know and something you have. OATH compliant OTP Generation (HOTP, TOTP) Mobile Soft Token (One Time Password) How it works? Login > Enter Your OTP Code > Done!

Secure Your Network and Stay Fraud Free! Helping You LinQ2 Factor enhances the level of trust between the end users and enterprise applications by enabling Strong.authentication between the entities Today, enterprises are embracing cloud and ever increasing mobility to empower user access to corporate data anytime, anywhere. With ever changing landscape of security threats pertaining to web, mobility and cloud offerings, enterprises.understand the threats and therefore demand stronger security to ensure protection of their corporate data Traditional user login method of simple username and password is not secure enough anymore and pose high risk to corporate data. Two factor authentication reduces such risk by introducing the dynamic password generated using industry standard OATH (Open Authentication) event-based or time based algorithms Password and User ID cannot protect you from being hacked! Traditionally every application uses a single factor user authentication by username and a password. But there is a high security risk involved in this approach because system cannot identify if it s a real user or an attacker. A simple scenario is where an attacker can just guess or use advanced random password tools to compromise your password there by gaining instant access to your online account and information. Stronger authentication uses more than one factor; not only do you have to know something like your password, but you have to have something like your smartphone or any unique thing like your fingerprint. LINQ2FA is the answer for this problem, it delivers the one time password on user s mobile device through SMS or can be generated on a user s mobile application (Soft Token). This process ensures the credibility of the user s identity and minimize the risk of being fraud or hacked.

LinQ2 Factor for Multiple Applications LinQ2 Factor allows you to create OATH-compliant strong authentication with multiple delivery channels to users on their mobile handsets. LinQ2 Factor is easy to integrate with various applications within enterprise from remote VPN access to mail servers and web portals and cloud based applications LinQ2 Factor can be smoothly integrated with leading technology providers such as Juniper, Cisco, Citrix, PaloAlto Networks, F5, Oracle and Microsoft Event-based Tokens Integration APIs VPN / SSL VPN Time-based Tokens RADIUS Citrix Access Gateway SMS OTP SOAP / XML Microsoft OWA LDAP Integration Enterprise Web Applications UNIX / Linux

LINQ2FA is Suitable for all industries LINQ2FA is suitable for all kinds of industries to reduce the odds of exploitation. If user password is stolen or intercepted, it alone will not be enough to take over their account. Below are the few examples from some sample industries where LINQ2FA can create a fraud free business for you and for your online users Security in Government Portals Private networks and their security E-Government public services where public identity verifications are involved Banks and Financial Sector s Security Verifications OTP (One time password ) for accessing online portal and secure dashboards Fraud financial transaction Any public or private organizations LINQ2FA can be used by any organization regardless of their industry type Ensuring fraud free cyber environment is the responsibility of each organization which can secure your business and its future

LinQ2 Factor for Multiple Applications Web based Configuration The configuration system is available as a web based user dashboard Auto Account Status Automatic enabling and disabling of user accounts User Portal Secure User Portal for self management of tokens Standards and Compliant OATH compliant OTP Generation (HOTP, TOTP) SMS Token on Mobile With the integration of any SMS gateway a secure SMS OTP token can be deliver on the phone based on OAuth Soft Token on Mobile For soft token LINQ2FA Mobile App is available in following platforms (Android, Windows and IOS Administrator in Control Administrator defined time release and length of session Secure Dashboard SSL enabled user application dashboard available for any gateway configuration Zero-Footprint Nothing required by the client side to install on SMS Token Standard Reports Audit user login reports and sessions Always update Delivers robust support to current and evolving authentication needs API and Integration flexibility LinQ2FA can be integrated with any application through SOAP APIs

LinQ2FA Use Cases Enabling Strong authentication for leading VPN s and Firewall solutions Strong authentication for Windows Logon Enabling Strong authentication for In house developed Applications Re-Set Password Applications OWA Strong authentication ERP portals

Head Office P. O. Box 69328, Al-Uruba Road Al-Wurud, Podium Building, 2nd Floor Riyadh 11547, Saudi Arabia +966 11 2931501 info@is.com.sa Dubai, UAE P. O. Box 414067, Office No. 4202 E 42nd Floor, Aspin commercial Tower Sheikh Zayed Road, Dubai, UAE +971 4 221 7197 dubai@is.com.sa Branches Dubai Jeddah Al Khobar @Innovative-Solutions @is_arabia @innovative-solutions-sa www.is.com.sa