I’m in charge of an exciting new marketing initiative. It’s still confidential and the privacy of the users is important to me. I need an easy, fast and fun MFA solution to protect their access. Unfortunately, I cannot rely on my internal IR for this. It’s a tactical project: it might either end suddenly or grow at the speed of light!
I’m in charge of IT and wish to add MFA to all external access for our employees, partners and clients. It has to ensure privacy on our web portal, VPN, Remote Desktop, Citrix and many other applications. Displaying our own branding on the MFA would be an asset in order to convey our corporate image. I don’t want to recruit for this and my IT staff is already fully booked.
I’m in charge of a large initiative for the dematerialization of our business (from physical counter to e-counter). Adding MFA is strategic. Not only does it target a few dozen thousand users, but it is also a prerequisite for the dematerialization. We have risky and costly transactions to protect against fraud and repudiation. As part of the service, the MFA should comply with our own corporate branding and remain under our full control.
Run an all-included service without the necessity for hardware tokens, for all your needs,
with full control and little effort.
No identity management, no local support or training, no post mail, no specific skills or equipment, no back-office management, able to grow suddenly with little impact on infrastructure and organization.
For users, includes registration, replacement and online training, all requiring a browser only; for IT staff, with nothing to distribute, ready interfaces and full compliance with the existing IAM processes.
Authentication is a critical function. Its unavailability may occur costs and risks. Inadequacies, losses, oversights, prohibitions, low connectivity, low batteries, all must be mitigated.
Tokens for everyone everywhere: trendy smartphone apps from major public stores, SMS code on old-timer mobiles and grid cards for mobile-reluctant users. Registering different tokens kills the need for a rescue solution and complex replacements.
The identity of users is confidential; target systems cannot be adapted for stronger authentication; whatever the solution, it should be easy to complement or be replaced.
Fast and non-intrusive integrations: on-demand interfaces based on standard protocols; no change to the existing IAM repositories; on-the-fly learning of the associations between users and tokens with no storage of usernames.
Authentication is also needed to secure sensitive operations such as payments, subscriptions, and more generally any kind of approvals, including legal contractual signature.
Whatever the token, authentication can be used to approve a particular transaction or document in a “non-hackable” and non-refutable manner, optionally leaving a legal signature in a PDF document.
So many scary stories about hacking these days, isn’t it risky to bet on software? May the hosting be delegated? Even in the cloud? And how secure are mobile apps in the public stores?
Every piece of software is built upon best practices against malicious users or hosting staffs: servers are sandboxed in hardened appliances, data storages are encrypted and mobile apps are delivered as obfuscated native code.
Not only secure, but also fun and easy to use.
ELCARD is also available as a white label solution and can be customised to completely match your corporate design.
with grids & SMS
with your branding
and barcode experience
IT System Department – CHUV – Lausanne
ELCARD is a solution developed by ELCA to address business needs for multi-factor authentication. The first commercial version of ELCARD was released in early 2005. ELCARD has been installed in dozens of production environments and is successfully performing in various business areas, including finance, insurance, health, government, hosting, retail commerce and transportation.
ELCARD can be set up within a day. It’s quick and easy to do. Give it a try.
Authentication to confirm a payment, an order, or any kind of sensitive information entered in some online form. Coupled with another of ELCA’s technologies, ELCARD can also deliver legal signatures, typically as non-refutable proof of a transaction or, more classically, to sign a document.
The ELCARD appliance can be installed on premise. The requirements are:
ELCARD is a strong multi-factor authentication solution that matches the mobility and security requirements of nomad users. Available in full SaaS mode, ELCARD is a quick and easy-to-run solution ensuring secured access to sensitive data and corporate resources with controlled costs.
DOWNLOAD OUR DOCUMENTATION