User credentials are regularly targeted by hackers in order to gain access to organisation networks.
These then become easily compromised through various attacks from malware, phishing and ransomware.
Organisations are faced with the ever-increasing challenge of defending cyber security from the threat of attack.
It is therefore crucial for enterprises to safeguard their most valuable resource.
Insufficient access management
As companies using cloud computing environments increase significantly,
it becomes more difficult to identify and manage users in the system. Loose user
authentication schemes cause catastrophic damage to organisations and users.
Therefore, appropriate access management, such as differential access rights
for each user role or access time control, is required.
Malicious access issue
In a situation where collaboration with internal or external partners is common,
accurate access management is a more important issue. If you have access to
information that external partners shouldn't have access to, or if your retired
employee's account is still used, you can face big problems.
Therefore, access rights should be classified so that malicious use is difficult.
Account takeover damage
If user account information is stolen, confidential corporate information may be
leaked. Accordingly, many companies force periodic password change or
multiple authentication, but users do not actively participate.
This is why the need for dynamic code continues to be demanded.
By assigning users with specific roles and ensuring they have the right level of access to corporate resources and networks,
swIDch provides strong security and improved user experience, and comfort for IT admin and users for mobile and remote working environments.
- Provide unidirectional code generated by the client without communication with the server
- Generate a dynamic code that changes every time and is safe from hacking and leakage
- Block attacks in advance with one-time code that does not allow cloning and spoofing attacks
- Protect devices by issuing a unique code that never overlaps with other connected devices
OTAC for Identity and Access Management
Device <> Device Authentication
User <> Service / Device Authentication
OTAC is a revolutionary authentication technology enabling enterprises to secure and protect data and people.
With OTAC, users can generate dynamic one-time access codes from their own mobile devices.
This works in an off-the-network environment.
The code also contains the right level of access and authority to access corporate resources and networks.
OTAC can also be easily integrated with the existing IAM solution and user experience is never compromised.
that provides all of the following features, tested and substantiated
by the University of Surrey technical report
Sufficient to IDENTIFY user
that does NOT duplicate
in off-the-network environment