the idenprotect difference

Security, Ease and Flexibility

Our unique approach to utilising a key managed in hardware is much more secure than a key stored in software. Unlike traditional software tokens our innovative technology leverages the secure hardware built into modern mobile devices to simplify security, reduce costs and enhance productivity.

With iDENprotect you can enable your business to increase the availability of information and ease of access without creating additional risk.

5 Reasons why Hardware is Critical to Success
  • Self-contained hardware-based security doesn’t require additional resources.
  • Dedicated hardware cannot be affected by malicious code infection, os vulnerabilities and unauthorised access.
  • Hardware offers stronger resilience against common and brute-force attacks.
  • Rules-based crypto modules can automatically shut down the system and securely purge data.
  • Access controls are stronger and cannot be manipulated via software.
IDENPROTECT SDK

Our SDK can be used by developers both in bespoke applications and as an independent authenticator app servicing authentication requests from other applications and systems. It fully integrates with industry-leading standards such as SAML2, OATH and OpenID. The result? You get greater flexibility and easier integration as well as the ability to maintain your existing business processes and infrastructure investments. And, of course, outstanding security in an ever riskier world.

idenprotect diagram
how it works

iDENprotect Explained

Hardware-backed security

Modern security for modern landscapes - the iDENprotect engine leverages the secure storage on the ARM chipset known as the secure enclave to protect against attack. Built upon trusted PKI standards our solution is secure by design and seeks to meet or exceed expectations such as the FIPS 140-2 standards.

Simplicity

Unlike traditional multi-factor authentication, we seek to achieve the optimum balance of security and usability, without compromise. A simple fingerprint scan can be used to access your information, wherever and whenever.

Scalability

iDENprotect enables you to consolidate other access control hardware devices, including smartcards and tokens, providing economies of scale. As end users already have smartphones we also reduce the need to purchase costly additional devices such as smart card readers or number generators.