SENTRYCS is identity and access management tool to secure your website or your own personal data, a comprehensive and frictionless solution fully-secured with multi-factor authentication. Whether accessing your personal online bank account, making purchases at online retailers, browsing social media, or even unlocking the door of your car, home, or hotel room, SENTRYCS allows you to use your mobile (Sentrycs Mobile) or browsers (Sentrycs Web) to manage all your digital and physical access needs securely and conveniently.
Why do I need SENTRYCS to secure my personal data?
Usernames and passwords are not secure, but simply adding proper multi-factor authentication (MFA) to your most sensitive apps can reduce your likelihood of getting hacked by at least 80%. The problem, however, is that most MFA products add several time-consuming and inconvenient steps for the user. Also, simply using an MFA solution doesn’t necessarily mean you’re more secure, as some forms of MFA used by sites, are known to be less secure (such as text messaging based verification codes). In order to comprehensively secure your personal apps and services, on all your devices, multiple products must typically be cobbled together.
SENTRYCS cuts through that complexity and is the only identity and access management tool you need to secure your personal data, a comprehensive and frictionless solution fully-secured. It allows you to use your mobile phone or browser to manage all your digital and physical access needs securely and conveniently.
Why does my company need SENTRYCS?
SENTRYCS is the only identity and access management tool you need to secure your corporate network, a comprehensive and frictionless solution fully-secured with multi-factor authentication. Whether logging company apps, accessing your personal online bank account, making purchases at online retailers, browsing social media, or even unlocking the door of your car, home, or hotel room, SENTRYCS allows you to use your mobile or browser to manage all your digital and physical access needs securely and conveniently.
- Replace hard tokens
- Replace ID cards
- Secure every access point to your corporate network, personal data, physical door, or IoT device
- Authenticate to cloud-based and on-premise apps securely and seamlessly
- Eliminate password breaches and their impact on you or your organization
- Eliminate the costs and risks of purchasing and managing security tokens and hardware
- Eliminate the manual typing of passwords and the resources involved with password complexity rules and resets
How does SENTRYCS provide security?
SENTRYCS secures organizations and individuals primarily by adding multi-factor authentication to individual apps and services, integrating seamlessly with both on-premise and cloud applications. Because cloud applications are accessible from many locations, authentication security is paramount. Most enterprise cloud platforms (like Google Apps and Salesforce) are accessible both inside and outside the office, and from a variety of different devices, leaving corporate network perimeters dramatically more extended and exposed than just a few years ago. With SENTRYCS, users can authenticate to their corporate and personal apps and services securely and conveniently, without an easy-to-steal or guess static username and password, and regardless of their location or device.
Also, because SENTRYCS offers the full-stack of identity and access management in one product, it’s able to provide seamless and integrated security without the risk of security holes and cracks that result from stitching together different products. The usability and convenience inherent in such a comprehensive design also reduces circumventions. Other, intrusive or tedious security products, or combination of products, encourage employees and other individuals to find ways to evade security measures.
What is SENTRYCS uniqueness?
The problem we are facing: compromised device contains malicious software — or malware — that has privileged access rights to the device’s operating system and core functions, such as SMS. Most mobile malware to date comes packaged into benign applications downloaded from third-party app stores and granted privileged access by the user during the installation process. Similar to phishing, mobile malware can capture credentials and interfere with SMS-based strong authentication by intercepting and redirecting one-time passwords. Another capability that is seen on jailbroken or rooted devices lets malware tamper with transactions on the fly. For example, it could change a payee account in a money transfer or transaction. Similar problem exists with browser-based apps. and it is called Man-in-the-Browser.
To resolve this problem one must extend IAM solution to prevent from malware to execute its goal of stealing the transaction. To this end SENTRYCS has invented Transification (patents pending). Transification is a new concept describing Context-bound Identification, binding together Transaction & Identification.
Context is a circumstance in which an event (transaction) occurs. Identification is the process of determining the identity of the person triggering the event.Transification is process of determination of the identity of the person triggering the event, bound to the circumstance of the event. Identity of the Payer, executing the transaction, is bound to the circumstance of the transaction, namely Payment and Payee:
Transification effectively replaces digital signature as being sufficiently secure , but much more usable and scalable.
What is SENTRYCS value proposition?
SENTRYCS offers a range of online login , identity , signature and data archiving services. Business customers can streamline the onboarding of new clients, digitally sign transactions and access critical data dashboards.
How Sentrycs stands-out from Competition ?
Sentrycs is more secure , because it incorporates 4 independent authentication layers:
- "Something you have": smartphone or computer (browser)
- "Something you know": PIN
- "Something you are" : Touchscreen Behavioral Biometrics or Contextual VoicePrint Biometrics
- "Somewhere you are" : Location verification.
( If some of the layers return false match result - Customer Application makes the final decision , based upon on its risk profile.This way False Rejects are eliminated , since in most cases two layers are sufficient.)
Sentrycs Identification is context-bound , thus preventing malware attack.
Sentrycs is more usable , because it involves fast (few seconds) , low friction , in-app. engagement.
Sentrycs is more scalable , because it can deployed with any Mobile or Web app. in a matter of 1 day only.