Intelligent RISK-based authentication with a nuanced approach to remote access and security…
Modern Two-Factor and Strong Image based OTC solutions..
Simplify your sign-on process with a single source of access for your business…
Customisable portal, for self-service user functions…
To simplify administration and your users’ lives, Sentry provides a seamless and unified approach to authentication. Using our login portal, all authentication requests can be routed and controlled via our Unified Login Page based on risk policies that you define. The result is a more secure, multi-layered verification, with transparent user friendly delivery.
One-Click Authentication, What Could be Easier
OneTouch PUSH gives you the convenience of verification at the touch of a button
Choose to authenticate quickly and easily with AuthControl Sentry’s PUSH based option; a notification message appears on the users mobile asking them to accept or reject the authentication by the simple press of a button, no codes required, simple, fast and secure.
Significant savings on help-desk costs
At least 50% of help-desk calls, on average, are password related, speak to us about how Unified Access can save on your IT management time and money.
Easy End-user Data Access, not Easy Access for Hackers!
Sentry’s adaptive approach to authentication combines our tried and tested validation software, with a large array of intelligent authentication options; a risk & rules based policy engine working in tandem with a Unified Login Page so data access remains safe.
A range of static and dynamic risk-based capabilities ensure optimal user experience without compromising efficiency or security.
Risk factors include:
- Who the user is
- Service being accessed
- IP address
- Physical location (geoIP)
- Normal user patterns
- Time / Day / Date
- Device O/S
Provides optimal user experience even whilst enforcing strict security policies. A risk profile to be built and applied to any user and service. The centralised control of the login page allows easy rollout of authentication.
A simple way to control how an application is accessed, the type of authentication challenge to be applied and whether a user should have access decided by various location based factors.
- Simplified, transparent user experience
- Single efficient authentication drives productivity
- Reduced help desk and maintenance costs
- Single authentication portal
- Adaptive Log-in
- Easy to manage and integrate