An end-to-end Secure Identity platform that allows organizations to handle up to very large quantities of users and transactions. Starting with User Enrolment processes and continuing with Secure Validation of all kinds of digital transactions.
Add users in a simple and secure
way, while fulfilling Compliance
requirements. Using Mobile
Devices, Web Portals or
Protect Access to Systems and
allow Secure Remote Working by
Authenticating Users through
Hardware & Mobile Tokens
Securely Validate Payments
and other Digital WYSIWYS
Transactions through the use of
Mobile Devices with Biometrics
and other factors.
Sign Digital Transactions with
Cryptographic processes that
allow legally binging outcomes in
many regions, and with the best
• FULLY COMPLIANT WITH MOST REGULATIONSThe Service is composed of a highly scalable Web Services API, based on Open Standards, that can run on lean infrastructure at a customer’s location and/or in a remote Cloud environment, with setup and maintenance performed by Verisec’s Expert Tech team.
• MULTIPLE INFRASTRUCURE OPTIONS
The API can be used by various customer applications to securely validate digital transactions; and it can run on lean infrastructure at a customer’s location and/or in a remote Cloud environment, with setup and maintenance performed by Verisec’s Expert Tech team.
• FULL VISIBILITY SERVICE DASHBOARD
Using the Verisec 10XAUTH Service Control Dashboard, an organization’s Security, Operation and Customer Service teams can Monitor in real-time all relevant variables related to various Authentication processes and Application environments, as well as the Service SLA itself. They can also execute day-to-day operations concerning individual users and their tokens; perform basic maintenance tasks such as setup automatic and manual backups, among others.
The Service Dashboard can also be used by organizations for current and future capacity planning for all processes and applications involving authentication. Easily identifying patterns and activity levels related to these processes, such as authentication services peak times, as well as short and long-term trends. Helping to anticipate new requirements and smoothly integrate these with current internal change processes.
• HIGHLY SCALABLE TECH
THE PROPRIETARY VERISEC TECHNOLOGY ON WHICH THE SERVICE RUNS, ALLOWS FOR QUICK AND SIMPLE INTEGRATIONS WITH VARIOUS APPLICATIONS AND TO SWIFTLY SCALE UP TO MILLIONS OF USERS AND DAILY TRANSACTIONS.
Verisec 10XAUTH Mobile Token
SMS OTP delivery
Lastly, the subscription-based comercial model enables for fast user growth within predictable and controlled budgets. The Verisec 10XAUTH Service is priced as a yearly subscription that includes all the required Verisec backend infrastructure, in various formats, base don a total number of Active Authenticators (the “Authenticaction Node”).
VERISEC DESIGN PRINCIPLES TRANSLATE INTO
WHAT YOU GET WITH THE VERISEC 10XAUTH SERVICE
THE LATEST TECH TO SCALE UP
• Designed from scratch to handle up to millions of users and Transactions using a lean infrastructure.
• No Capex or obsolescence risks involved and ability to smoothly handle any activity peaks.
THE LATEST TECH TO SECURE
• At the client level, patented SDK uses Secure Channel with PULL process to pass keys and transaction data.
• At the server level, all security key material stored within hardware security modules.
THE EXPERIENCE & TALENT
• Verisec’s experienced Tech team can swiftly configure service components to cater for each organizations ongoing needs.
• No learning curves or training required & no staff rotation risks.
THE PEACE OF MIND
• Verisec’s Tech team will make sure service components are in optimum condition for best performance & security levels.
• Control & Full Visibility over all service aspects for ops and sec teams.
In a time of constant Cyber Attacks where user credentials and passwords are in most cases either the target or the means for the attacks, Security and Regulation requirements demand the use of Strong User Authentication applied to an ever-growing number and types of users and transactions. For many financial institutions particularly, when it comes to authentication, SCALE is the new name of the game. However, this exponential level of growth is not best handled by Authentication Systems that can only grow in a “normal” way. This level of growth requires an Authentication System that can grow 10 times as fast & 10 times as big, that allows organizations to GO LARGE & SCALE UP.