what is the ideal solution that can provide STRONG AUTHENTICATION to protect your valuable business information?
Related Two Factor Authentication Products And Services
SecureMetric offers Open Authentication Technique (OATH) compliance dynamic password system, which consists of SecureOTP Authentication Server with SecureOTP series of hardware and mobile tokens. This solution can effectively address the weakness of User Name and Password with additional layer of security on the hand of the end users. So far, SecureMetric already implemented more than 20 2FA projects to banks and enterprises across Southeast Asia.
SecureOTP Authentication Server playing the role as a powerful Two-factor authentication (2FA) backend and the console of the SecureOTP implementation. It serves as a dynamic password and transaction verification platform with mutual authentication mechanisms that can achieve the objective to verify the authenticity of the user application system and the identity of the logged in user.
SecureOTP Event offers strong hardware based dynamic password for one time use Two-Factor Authentication through Event synchronous One-Time-Password technique or Event based One-Time-Password. This hardware token is designed based on OATH standards and can be seamlessly integrated into any OATH compliance backend system. The user just need to press the button on the token and a set of password will be dynamically generated.
SecureOTP Time is another form of hardware based dynamic password system based on real time clocks reside inside the hardware token and the backend authentication server. Usually Time synchronous One-Time-Password technique is more secure than Event based One-Time-Password. This hardware token is designed based on OATH standards with built-in real time clock and can be seamlessly integrated into any OATH compliance backend system.
The evolution of smart phone has significantly changed the landscape of how we deploy 2FA. Securemetric offers secure yet highly compatible mobile-based One-Time-Password module for customer; it can convert the end user’s smart phone to become a secured 2FA instantly. We offer customization with flexibility for customer to embed it into their mobile application, achieving 2FA without affecting great end user experience on using your mobile application.