Gemalto

Gemalto
Show:
Sort By:
Context-based Authentication

Context-based authentication enables effective risk management by requiring an additional authenticator factor only in high risk situations, lowering the barrier for strong authentication and enhancing user convenience.

Context-based or contextual authentication is central to creating compliance based access policies and preventing security fatigue. Taking into account variables, such as your network, location and operating system, contextual data provides additional information on a login attempt, and fires the appropriate access policy.
By assessing a user’s contextual login attributes, single sign on and access management solutions can continuously match the level of authentication required from the user with the access policy defined for each application.

Hardware-Based OTP Authenticators

OTP hardware tokens used to generate highly secure one-time passwords, ensuring that only properly authenticated users are authorized access to critical applications and data.

Out-of-Band Authenticators

Delivered by SMS text messages or email, out-of-band authentication reduces the administrative overhead of a strong authentication solution by removing the need to distribute hardware or install software.

IDBridge CT1100 - Bluetooth Smart Badge Holder-White

Use Cases: *Secure remote access (VPN/ Web) *Digital signature *Network logon *Strong two-factor authentication *Email encryption

SAS - Authentication Service - Made Easy

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

How Identity and Access Management (IAM) Works in the Cloud

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

How Continuous Authentication Is Enhancing Cloud Access Management

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

Cloud Security: Secure Data in Any Cloud Environment

Cloud Security: Secure Data in Any Cloud Environment

Data Protection On Demand - DPOD

Deploy and manage key management and hardware security module services, on-demand and from the cloud.

Trusted access and Smart Single Sign-On

Trusted access and Smart Single Sign-On to all your apps with SafeNet Trusted Access, identity-as-a-service.

Authentication-as-a-Service

SafeNet Authentication Service (SAS) delivers fully automated strong authentication from the cloud, enabling organization to protect cloud-based and on-premises applications, from any device with user-friendly token options.

Authentication Management Platforms

Enterprise-grade authentication management platform enables secure access, network access, and PKI digital signing as well as extensive certificate lifecycle management.

Out-of-Band Authentication

OOB authenticators utilize external channels such as SMS or email to send dynamic passwords to users.

Certificate-based PKI Smart Cards

Access Control via Smart Card Authentication

Smartjac’s range of certificate-based smart cards offer strong multi-factor authentication in a traditional credit card form factor and enable organizations to address their PKI security needs. Smartjac's smart cards offer a single solution for strong authentication and applications access control, including remote access, network access, password management, network logon, as well as corporate ID badges, magnetic stripes and proximity.

Smartjac’s certificate-based smart cards meet the highest security standards, including FIPS 140-2 Common Criteria CC EAL5+ and eIDAS compliancy, and enable compliance with security regulations like HIPAA, HSPD-12, SOX, GLBA, FFIEC, Basel II, PCI, and HITRUST.

Keyword Search

Newsletter signup

Subscribe to our mailing list
* indicates required
By subscribing you accept our
 
 
 

This Site

Webstore menu