Passwords are the most common form of authentication used to control access. At the same time, passwords are also recognised as being an extremely poor form of protection.
On February 23rd, a joint team from the Dutch CWI University and Google announced that they had generated the first ever collision in the SHA-1 cryptographic hashing algorithm.
Different implementations of the same authentication method will provide very different levels of security. In our opinion, strong authentication should be pervasive, transparent and risk-based.
On this moment, we held the 1st position within our category of Risk, Intelligence & Security when it comes to the public votes. But we are not there yet, we need your vote!
We enable access and authorization for banking employees and for their customers.
We offer solutions to manage and use Government personnel cards and Citizens eID following strict policies.
We enable protected access to medical data for both Healthcare providers and their patients.
We help Enterprises to create easy access 24x7 and optimize their employee security policies.