MAGASIN
Nous avons ce qu’il vous faut
Amplificateur Wi-Fi
Commutateurs réseau
Accessoires
Caméras de sécurité
Téléphonie


Venez nous voir
1867 Route du Carrefour
Val-des-Monts, Québec

MON COMPTE
Connectez-vous à votre compte
Adresse courriel


Mot de passe



J'ai oublié mon mot de passe

Multi Factor Authentication Service

Usernames and passwords are not secure

It is a known fact in this day and age that hackers can and may eventually gain access to your user’s application credentials. Every day, companies are being hacked through social engineering, malicious application, or old fashion network hacks. Malicious applications such as key loggers or screen grabbers on mobile devices and computers can capture enough information for hackers to impersonate users who may have access to your sensitive company or client information.

To combat these cyber-attacks, organizations provide their employees with expensive physical RSA SecurID tokens that add a second factor of authentication. This is secure because it’s something the users carry with them, when the user logs-in to an application and enters his/her credential, he/she is also asked to enter the PIN generated by the device. But, that physical token solution can be very expensive and is not a viable solution if you need to support a large number of internal or external users.

Our solution

We offer a Two Factor Authentication (TFA/2FA) that is as effective and as secure as physical RSA SecurID tokens, but without the associated price tag and cost limitations.

Xamika True Two Factor Authentication (TTFA) helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication with a range of easy verification options, such as a phone call or text message. Once the user has successfully entered his/her username and password to access your application, the system will trigger one of two methods to validate the 2nd factor of authentication:

  1. We will do an automated voice call to a pre-defined phone number, and ask for a randomly generated one-time PIN located on your application’s screen.
  2. We will send an SMS text message with a one-time PIN to a pre-defined mobile phone number, in turn the user must enter this PIN in your application.

Whatever method the user prefers, or that you allow. Adopt the strategy that makes most sense to your business, bring-your-own-device (BYOD), or corporate device.

Xamika True Two Factor Authentication (TTFA)

  • Safeguard access to your applications with a second factor verification system (phone calls and/or SMS Text Messages).
  • Support outgoing 2nd factor verification voice calls to both land lines (with or without extension numbers) and mobile phones, as well as SMS text messages to mobile phones.
  • Supported call destinations include: Canada and the United States (more will be added shortly).
  • Simple low cost Web Service API, you don’t have to buy any expensive dial-out telephony infrastructure.
  • Reduce risk, meet security compliance requirements.
  • Real-time fraud monitoring via our web service API.
  • We don’t store any of your data with the exception of what you pass via the API call for the purpose of invoicing (telephone number to call or SMS and user’s unique ID)

Build it into your applications

Using our Web Service API, you can integrate True Two Factor Authentication into your application’s sign-in or transaction processes, leveraging your application’s existing user database.

Cloud based High Availability (HA) infrastructure

Our services are hosted on world class cloud infrastructure with redundancy in multiple datacenters across the United States and Canada, to guarantee you the fastest access and best in-class service level.

Make it part of your ISO 27001 Compliance

Our True Two Factor Authentication meets the ISO 27000 family of standards and helps organizations keep information assets secure.

Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties.

ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS).

An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.

It can help small, medium and large businesses in any sector keep information assets secure.

Low cost model

We offer a very simple and cost effective model compared to alternatives.

For more information or to subscribe

If you would like to subscribe to our Multi Factor Authentication service or would simply like more information, you can call us at 1-855-926-4521 or email us at sales@xamika.com