two-factor-authentication

DUSKWatch Authentication

 

Strong Authentication

Relying on a public key infrastructure, DUSKWatch Authentication adds strong authentication to control accesses to digital assets and to reliably manage the identity of users.

High-level Access Control

The authentication provided by DUSKWatch Authentication is characterized by a high level of security. All user keys employed for sensitive operations are protected with strong encryption and not by a simple PIN. You don’t have to worry should any token be lost or compromised.

Extra Security Layer

Whether your computing environment comprises workstations running Windows 7 and up that still relies on Windows Server 2012 or later, DUSKWatch Authentication is the strong solution for adding an extra security layer to control users’ identities.

Multiple Domains and Certificates

DUSKWatch Authentication can be used on a single or multiple networks. Separately secured, domain credentials are transparently selected. It is also possible to use a single certificate for all domain operations or as many separate certificates as desired for reduced vulnerabilities. The certificate selection is done transparently.

Deployment Models

DUSKWatch Authentication is compatible with Active Directory and Active Directory Federation Services to provide directory-based permissions to access the organization’s data.

Get secure identities and access management for the following network models:

  • On-premises
  • VPN
  • Remote Desktop
  • Hybrid: AD FS, Sync, Office 365 SSO

Tokens Form-Factors

DUSK-ID Card remains a sound choice because no private key ever leaves the smart card. For mobility, DUSK-ID Hybrid combines the high-level security of a microprocessor with a USB connection to eliminate card readers. All benefit from MULTOS secure platform of international reputation.

Token Management

The DUSKWatch Manager is an administrator console used for token management such as PIN changes, certificate renewal and replacement, to name a few.

Benefits

  • Reliable strong authentication based on trusted public key infrastructures
  • Military-grade security
  • Lower total cost of ownership
  • Simple, rapid integration with network infrastructure
  • Highly secure MULTOS platform
  • Illegal intrusions prevention
  • Secure credential certificates management
  • GDPR compliance
Brochure Brochure