Reportstar Technologies provides Strong Authentication and One-Time Passwords based on the world leading Identikey Technology, which supports many various types of authentication tokens.
Built with the customer in mind, the IDENTIKEY Authentication server provides support for hardware, software, zero footprint, e-signatures and mobile authentication right out-of-the-box. It is scalable to accommodate large and small implementations—all without the headaches commonly associated with the maintenance of multi-factor authentication systems.
Authentication and transaction validation functions can be integrated into Firewalls, Servers, all radius supported solutions, Outlook web access (OWA) and many existing web-based applications using a built-in SOAP API.
Remote and internal users identity can be quickly established with an individually assigned DIGIPASS token. The DIGIPASS device generates a unique one-time password (OTP) that replaces insecure static passwords.
We have various authentications tokens types :
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Elevate your security operations with an external risk management solution that protects against threats like credential theft, fraud, and brand impersonation.
Ensure maximum usage and return on IT investments with quick identification and alerting of problems 24 x 7. Reportstar Monitoring Service provides your enterprise with real-time, 24x7 monitoring and ...
Get complete visibility into changes, data access and data usage on file servers with security intelligence about all changes made to files, folders, shares and permissions together with file access...
Zoom in on security control gaps with comprehensive network modeling and cutting-edge attack vector analytics. Create a model of your attack surface by collecting data from all network devices and...
A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment. Reportstar Technologies solutions provide a detailed analysis of the state of your...
Human error is involved in over 90% of all security breaches, making employees a primary target for cybercriminals. Cybersecurity Awareness Training directly addresses this human element,...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
+27118847633
info@reportstar.net
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions