Cyber security breach resulting from hacking and phishing is a huge problem at present. As a result, many consumer brands are clamoring to protect their online assets from unwanted obtrusions by multifactor authentication solutions. The predominant reason why multifactor authentication (MFA) is becoming increasingly popular strategy to mitigate cyber fraud is due to its overall complexity in trying to breach it. The complexity arises from the multiple identity proofs that need to be presented to an authentication device before access can be granted. Simply put, MFA is an authentication system where access to any information is permitted only after at least two separate pieces of evidence is submitted to validate the identity of a single user. The identity proofs involve personal information that only the claimant can know, or a code the user exclusively possesses or a non-replicable identity mark that is unique to user as a person. Some examples of unique identity proofs include PIN numbers, personal questions, finger prints or smart cards with unique identification tags.
Commonly used multifactor authentication includes the two-factor authentication (2FA) and the three-factor authentication (3FA). Depending on the sensitivity of the data that needs to be protected security can be stepped up or down by a factor. Two-factor requires two unique identification proofs while three-factor requires three separate identification proofs.
Authshield is a unique two-factor authentication system developed at Pelorus with the aim of providing the best multifactor authentication to all clients. This one touch authentication mechanism makes online information hack proof by eliminating the one-time password concept and instead using smart phones as the authentication device. It is very easy to use and is capable of easily identifying each user every time he /she tries to access sensitive data.
Some tokens of authentication used by Authshield include the following:
- Authshield soft token: This provides a random one time password via SMS or email> this password or code needs to be entered before further transactions can happen.
- Authshield hard token: This incorporates a hardware which resets the password every ninety seconds. When the user enters the password, the hard token uses matching encryption algorithm to the system connected to the Finacus server to authenticate the user.
- Authshield USB based token: In this product, data is encrypted on a USB token and can only be read when the USB token is inserted and the corresponding PIN is entered.
- Authshield Mobile based token: The one time password generation software is set up on the smart phone. The software connects to the Finacus server using GPRS/2G/3G connection to validate the user identity.
- Authshield image match login: This uses the picture of the user to match his identity along with a password protection. If the picture matches the picture already pre-existing in the database access is granted.
In addition to the various security tokens, the Authshield is provided with additional features such as telephonic support with a call router that supports SIP, IAX2, PRI E1 and analog media and signaling protocols, a call logging system where every call via the call router is automatically recorded and finally a provision of scalability on a single server, with minimum extensions from 8 to a maximum of 500.
Pelorus focuses on providing innovative and customizable technology to all clients. Authshield is a smart innovation for customers who are focused on installing high yet cos-effective security measures to protect their assets.