The Hague, Netherlands (PressExposure) January 12, 2009 -- With Identity Assurance the right users are protected by strong and advanced authentication solutions and services. The identity of the user can be verified with one-time-password authentication based on mobile phones or OTP hardware token or verification of the userâs typing behavior during login, before granting access after checking the permission rights.
Most organizations that operate online, offer their clients, partners, suppliers or employees access to private or sensitive online services and information or let them perform transactions. Controlling the identity and access of the users to systems, networks and applications are ranked high in priority on the list of security measures nowadays. Strong authentication is based on the principle of âsomething you know (password/PIN)â and âsomething you have (authentication token)â, or âsomething you are (biometrics)â and is therefore more secure than only username and password. With a secure and affordable identity assurance service the organization decides on the strong authentication needs, demands and wishes to be managed while paying only on a monthly basis for the usage of the service. With the online Identity Assurance of ID Control no implementation and maintenance of an authentication infrastructure is required, by making use of the already existing and pluggable infrastructure and expertise of ID Controlâs broad partner network.
All hardware, security, infrastructure and software components and services needed for implementing and maintaining the authentication management environment are taken care of. This means ID Control Server software, web based management interface, ID Control authentication tokens like HandyID, MessageID, KeystrokeID and ID Control OTP Key and the maintenance and support by an external highly qualified engineer are included or optional.
Hans Kortekaas, CEO ID Control, indicates that ID Control provides this managed strong authentication service with standard integration to existing web mail, server based computing, SSL VPN, web applications and network environments, while taking away the hassle and burden of its management. The customer does not need to invest in hardware, authentication tokens, software, implementation, trainings, helpdesk, maintenance and support and can adapt to authentication needs in the future. With ID Controlâs online Identity Assurance you are secured by the best and most advanced identity and access management solutions and services in the industry while diminishing the risks and threats related to online identity theft and fraud.
ID Control, http://www.idcontrol.com located in The Hague, provides next to a One Time Password generating hardware token the âID Control OTP Keyâ, OTP based on mobile phones with âMessageIDâ OTP via SMS , âHandyIDâ a mobile OTP application and PKI the âID Control USB Tokenâ, but can also recognize users on the basis of their typing behaviour with âKeystrokeIDâ while logging in. All tokens are managed by ID Control Server hosted at the partnerâs or customerâs side, by which user are strongly authenticated. Above all organizations with different authentication methods and tokens for a variety of systems, applications, users and services can manage all of them in one web based central authentication environment with the âID Control Serverâ.