ICAM
ICAM
Solutions

ICAM

We enable organizations to manage digital identities and
control user access to critical corporate information.

Pain points

User credentials are regularly targeted by hackers in order to gain access to organisation networks.
These then become easily compromised through various attacks from malware, phishing and ransomware.
Organisations are faced with the ever-increasing challenge of defending cyber security from the threat of attack.
It is therefore crucial for enterprises to safeguard their most valuable resource.

Insufficient access management

Insufficient access management

As companies using cloud computing environments increase significantly,
it becomes more difficult to identify and manage users in the system. Loose user
authentication schemes cause catastrophic damage to organisations and users.
Therefore, appropriate access management, such as differential access rights
for each user role or access time control, is required.

Malicious access issue

In a situation where collaboration with internal or external partners is common,
accurate access management is a more important issue. If you have access to
information that external partners shouldn't have access to, or if your retired
employee's account is still used, you can face big problems.
Therefore, access rights should be classified so that malicious use is difficult.

Account takeover damage

If user account information is stolen, confidential corporate information may be
leaked. Accordingly, many companies force periodic password change or
multiple authentication, but users do not actively participate.
This is why the need for dynamic code continues to be demanded.

The solution

By assigning users with specific roles and ensuring they have the right level of access to corporate resources and networks,
swIDch provides strong security and improved user experience, and comfort for IT admin and users for mobile and remote working environments.

  • Provide unidirectional code generated by the client without communication with the server
  • Generate a dynamic code that changes every time and is safe from hacking and leakage
  • Block attacks in advance with one-time code that does not allow cloning and spoofing attacks
  • Protect devices by issuing a unique code that never overlaps with other connected devices

OTAC for Identity and Access Management

Device <> Device Authentication

Existing
Existing
OTAC
OTAC

User <> Service / Device Authentication

Existing
Existing
OTAC
OTAC

OTAC is a revolutionary authentication technology enabling enterprises to secure and protect data and people.
With OTAC, users can generate dynamic one-time access codes from their own mobile devices.
This works in an off-the-network environment.
The code also contains the right level of access and authority to access corporate resources and networks.
OTAC can also be easily integrated with the existing IAM solution and user experience is never compromised.

Why swIDch

OTAC, developed by swIDch, is the original technology
that provides all of the following features, tested and substantiated
by the University of Surrey technical report
Why swIDch
DYNAMIC CODE that is
Sufficient to IDENTIFY user
DYNAMIC Authentication code
that does NOT duplicate
Uni-directional authentication
in off-the-network environment

OTAC is a dynamic code, which means the code keeps changing. As a result, you don’t need to worry about any leak of your personal information, such as
your card details, because the codes must have already been changed when others try to use them.

The network connection is NOT necessary at all for generating OTAC.

Reducing an authentication stage that requires the network connection directly means there are fewer gateways forthe hackers to access our personal information.

Moreover, this feature enables usersto authenticate even when they arein networkless environments, suchas on the plane, underground, rural or foreign areas.

swIDch can guarantee that the code never duplicates with anyone
at any given moment.

There is NO chance of someone else having the same code.

The users or their devices can be identified with the code alone.

Once OTAC has been generated, providing OTAC alone is already fully sufficient to identify the user as the code is unique.

It means, you can forget about the bundles of static information including IDs and passwords.