Founded in 1999, Authentify, Inc. provides automated authentication services for many of the largest online business enterprises operating today. The Authentify service enables organizations to quickly and cost-effectively perform real-time, multi-factor user authentication during an Internet session. By leveraging the familiarity of the telephone networks, Authentify delivers an effective multi-factor authentication process that is practical for business and easy for end users.

Authentify’s patented technology employs a message-based architecture to seamlessly integrate with existing online processes developed for e-business, secure information access, or the distribution of security credentials.

Authentify Family of Products

By synchronizing a user’s web session with an automated telephone call, Authentify makes undeniable contact with the person behind the computer while capturing transaction details for audit purposes.

Authentify provides end users with an intuitive authentication process that does not require additional software or training on the user’s behalf. With its multi-language compatibility using landline or mobile phones, Authentify’s service offers a truly portable authentication solution with worldwide reach.

X

Authentify xFA

The end user authentication market space is being subjected to a “perfect storm”. The rapid push of the Internet into the developing economies is fueling a rapid increase growth in global e-commerce. These developments in turn are fueling the relentless campaign of cyber-criminal exploits against end user accounts and businesses.

One by one, less robust authentication technologies relying on strengthening the use of usernames and passwords have been compromised. Something better is needed. That something is Authentify xFA.

For an Enterprise who recognizes that the simple username and password system for accessing wired properties is broken, but must still have user friendly security, Authentify xFA’s cloud-based solution is the only one to offer the strength of digital certificates coupled to a voice biometric delivered in an elegantly simple mobile app.

Authentify xFA:

  • Eliminates the need to type passwords
  • Offers an authentication process users will love
  • ​Defeats keystroke loggers and other threats
  • ​Delivers the strength of PKI and biometrics minus the administration and cost

Instead of remembering passwords, the end user can wield a validated digital credential, tied to them by their voice biometric. The user interface is a simple to use mobile app. The Authentify xFA service that powers the app shields the end user and the Enterprise from the complexity of deploying and using digital certificates and voice biometrics.

More importantly, for user communities with users who do not have smart phones, Authentify can offer voice biometrics via standard mobile phones or landlines. The Enterprise can still deliver a more uniform and secure authentication process.

 

click ​here​​ to visit vend​or website​

X

Authentify​​​​ 2CHK

The Authentify 2CHK® Innovation

​Authentify 2CHK® is an innovative transaction “authenticator”. For financial services firms who must protect their customers from man-in-the-middle and man-in-the-browser attacks, 2CHK offers a secure communication channel to their customers via their phones, or a secure second channel to the user’s desktop.
Authentify 2CHK will display transaction details for end user review and approval before final execution. If the details do not match what the user expected, the user can cancel the transaction via 2CHK.

Authentify 2CHK features:

  1. Multiple levels of security
  2. Review approval for multiple transactions
  3. Transaction signature capability
  4. An intuitive user interface
  5. No new devices to provision
  6. Strong protection for users and transactions

 

click ​here​​ to visit vend​or website​

X

Identity & Access Management

Authentify’s Out-of-Band authentication (OOBA) provides corporations with a cost-effective, user-friendly approach to Identity & Access Management. Authentify employs a process requiring the user’s synchronized exchange between the Internet and their phone to provide powerful out-of-band authentication. This convenient method of user verification will enhance security in every identity and access management scenario, as well as save valuable time and resources.

Common Authentify Applications

Enrollment. The Authentify process can verify a new user’s identity and provide an audit trail of the enrollment process.

Emergency Access. Authentify can provide temporary access by substituting for a missing or damaged credential or can restore access, verifying identity before a user can reset his password.

​The Out-of-Band Authentication Experience

Out-of-Band Authentication (OOBA) employs separate communication channels, at least one of which is independently maintained and trusted to authenticate an end user. Authentify engages the user’s online session and their telephone in a simultaneous exchange. Users verify their identities by demonstrating their ability to control a trusted phone; a process for providing easy access without sacrificing security.

 

click ​here​​ to visit vend​or website​

X

Password Resets

Resetting account passwords represents a crucial security event for online customer accounts. With online criminals gaining easy access to customer generated passwords and other account information, it is nearly impossible to ensure that delivering a new password through email or other online mechanisms is secure.

Authentify’s password reset application combines true out-of-band safeguards with real-time delivery to produce the most secure and convenient method of resetting account access.

 

Application​ Overview


​​

click ​here​​ to visit vend​or website​

X

2 Factor Authentication

2 Factor Authentication or 2FA is the security term for providing two different form factors of identification for verifying an identity or authorizing an action.

The generally accepted form factors themselves are typically from three categories:

  • ​​Something a user knows. (a password or the answer to a challenge question)
  • Something a user has. (an ATM card or a security token)
  • Something a user is. (a biometric such as a voice print or finger print)

Authentify offers out-of-band authentication services in more than 120 countries and in any spoken language. We’ve learned one approach seldom suits all needs. Global presence or local focus we can tailor a solution for you and your users.  ​

Factor Authentication Using the Telephone

Authentify enables online financial services firms to employ their online user’s telephone, something they have, as the second authentication factor. A phone call synchronized to an online session can be used as part of an online account activation, a regular part of a secure logon, a transaction verification or any account activity associated with higher risk.

How does it w​ork?

​Authentify’s two factor authentication phone services are invoked by an online property as a Web service. When using an account protected by Authentify, a user will logon to their account as they normally do. If they are logging on from an unfamiliar location, initiating a larger than normal transaction or attempting something viewed as higher risk by the bank, the bank’s server will send a request for a call via a secure Internet connection to Authentify.

The request contains just enough information for Authentify’s service center to place a phone call. No Personally Identifiable Information (PII) or account specific information need change hands between your institution and Authentify. Authentify will place the call and communicate the outcome of the call back to the institution.

  1. User activity triggers need for 2FA​
  2. Fin. Services firm requests phone call
  3. Authentify places call
  4. User follows instruction rec’d during call.

What are the benefits of using an end user’s telephone as part of an authentication and security process? 

Employing an end user’s telephone as part of a logon or other security process means there is no software involved for you or your users, nothing to deploy, no training required and the process will work anywhere there is phone service.

 

click ​here​​ to visit vend​or website​

X
2 Factor Authentication for VPN’s

Control access to your VPN with 2FA. Ensure secure access from anywhere, anytime not to just anyone! Users seeking to logon are authenticated via an out-of-band channel using a second device. The Authentify process transforms any device at which the user can be reached via voice, 3G/4G, or other data channel into a powerful security tool.

Authentify’s phone-based out-of-band authentication (OOBA) process is a popular way to add 2 Factor Authentication (2FA) as a step up process to Virtual Private Network (VPN) logons. Some call this 2 Step Verification. In this authentication schema, the end user’s telephone becomes a proxy for other form of a security credential.

Using the end user’s telephone or other smart device in this fashion for VPN access requires prior knowledge of the end user’s telephone number. The end user’s telephone number must also be added/included as a field in their normal LDAP accessible database or Active Directory user record.

The Authentify service and the subsequent telephone call are invoked as a Web service. This lightweight RESTful architecture requires the VPN Gateway to be able to communicate with Authentify via an HTTPS Internet connection. To achieve the https communication, Authentify provides software for installing a RADIUS communication proxy on a WIN OS server in the network and the RADIUS proxy manages the LDAP communications with your directory server.

The diagram below offers a high level logical diagram and sequence flow of the authentication process.

  1. The VPN gateway passes this information to the Authentify 2FAV Proxy™ application.
  2. The Authentify 2FAV Proxy™ searches the appropriate directory service for a user’s telephone number.
  3. The Authentify OOBA Service contacts the end user’s telephone or app on their smart device.
  4. The Authentify OOBA Service synchronizes a voice or push button exchange with the end user.
  5. The 2FAV Proxy™ communicates the success or failure of that authentication exchange to the VPN Gateway.
  6. The end user is granted or denied access accordingly.

Employing the end user’s telephone as a second authentication factor for VPN’s offers a number of advantages. The most obvious, an end user often protects and takes better care of their telephone than they may any other physical credential. The process also works globally. Anywhere a user can be reached by phone, they can be authenticated. The audit trail captured via the telephone will also help meet any compliance requirements you may have to meet and is readily accepted by auditors.

 

click ​here​​ to visit vend​or website​

X

Transaction Verification | Payee Verification

Man-in-the-Middle and Man-in-the-Browser attacks are used to intercept transactions “in progress” and manipulate the details without the legitimate account holder’s knowledge. Typically, the amount of a transaction and the destination account are changed. The user believes they have sent $ 98 to the electric company, instead $980 have been directed to a different account.

Attacks and exploits at the transaction level have become serious enough to warrant specific mention in the July 2011 FFIEC Supplement to Authentication in an Internet Banking Environment.

Phone-based, out-of-band authentication is ideally suited to validate a transaction, or the addition of a new payee to an electronic funds transfer enabled account. The cyber-criminal may be able to steal account credential or re-direct a payment, but it raises the bar if they must also coordinate an attack against the legitimate account holder’s telephone.

In the simplest scenario, when an account is being used and a transaction amount is larger than ‘normal’ or a new payee is encountered on the bank side, the end user’s telephone will ring. The legitimate user will hear the transaction details “vocalized” by a human voice, (no cyber-voices with Authentify applications). For example, the user will hear “Hello, this is XYZ financial, if you are sending nine hundred and eighty dollars to an account ending in 4521, please enter the confirmation code displayed in your browser window”.

Authentify also offers transaction verification via the smart phone app

 

click ​here​​ to visit vend​or website​