RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

ActivIdentity 4TRESS Authentication Server

Product
Developers: ActivIdentity
Last Release Date: July, 2012
Branches: Financial services, investments and audit
Technology: Mobile Device Management (MDM),  cybersecurity - Authentication,  Means of enciphering are cybersecurity

4TRESS Authentication Server 7.0

The solution supports 20 methods of authentication, 15 of which — for two-factor authentication, and provides a full compliance to requirements of FFIEC and PCI-DSS. The solution is the most universal platform in the segment with the single interface of management for a set of service channels.

4TRESS Authentication Server 7.0 from ActivIdentity protects the clients using Internet banking services from a set of threats, including the attacks of the class "the person-in the middle" and "person-in-the browser", at the same time being the lung in administration which is completely localized and meeting the requirements to the technology which is used physically disabled people. Possibly several options of implementation, including the hardware solution and program implementation.

4TRESS Authentication Server supports the latest algorithms of open standards and 10 new methods of authentication, including:

  • ActivIdentity Mobile token;
  • ActivIdentity PC token;
  • ActivIdentity Web token;
  • DeviceID (Web Token SDK);
  • The one-time password or code of the signature of transaction sent by the SMS;
  • The one-time password or code of the signature of transaction sent by e-mail;
  • LDAP passwords;
  • Work in the RADIUS server mode.

4TRESS Authentication Server 7.0 locates an opportunity to manage a broad spectrum of devices and tokens and also is available in the hardware version — 4TRESS of Authentication Appliance for Banking.

Detailed control of authentication

The ActivIdentity company (division of HID Global) working at the market of ensuring safe authentication submitted in the summer of 2012 the new version of authentication server 4TRESS. According to developers, updated 4TRESS provides detailed control of authentication and allows to define not only what operating systems and software tokens are used by employees, but also what their versions. Thanks to this solution users can easily select what mobile and computer operating systems have the right to use software tokens and also what versions of tokens are resolved.

As the increasing number of employees of the companies use personal smartphones and tablets on a workplace — the phenomenon known as BYOD (Bring Your Own Device) — need to control these devices and to protect corporate data turns into a pressing problem, especially for the organizations with the raised security level. Solution 4TRESS allows to solve this problem, says ActivIdentity.

ActivIdentity 4TRESS provides full and multilevel authentication for the companies aiming to provide secure access to the data. The updated product allows to control easily OTP tokens (One-Time-Password) depending on type of the operating system and the version software token thanks to what the balance between security, convenience and cost is reached, explained in the company.

As noted in ActivIdentity, due to turning on of mechanisms of management the data access can be provided in a limited type, for example, according to a certain operating system. It means that the system administrator can create a certain user profile of those to whom registered access to confidential data and also to limit methods of this access and types of devices from which users can have it.

New opportunities of authentication server 4TRESS are among: control of the platform software token — for example, access can be resolved from the IOS, Windows and BlackBerry platforms, but is prohibited from phones on the Android platform and J2ME; control of versions of all keys authenticators — for example, the user can permit use software token of v.4.1.1 working at iOS, but to prohibit access from the version of v4.0.1 or any other version that gives to users additional opportunities for risk reduction; a possibility of creation of reports on software versions — reports allow to define how many end users use this or that type of the operating system and the version software token.