< Back to list

WiKID Strong Authentication System

WiKID Strong Authentication System combines public key encryption and Internet-enabled devices to securely deliver one-time passcodes. The WiKID solution is much less expensive than a hardware-based token solution, easier to implement and maintain, and far more extensible . Token clients can run on Linux, Windows, Mac, PocketPC, Palm, Blackberry and J2ME devices. WiKID created a better two-factor solution by focusing on reducing costs, increasing ease of use both for administrators and end users and by providing an extensible platform for our customers. Of paramount importance to WiKID is that our solution be as secure as existing hardware based solutions. Companies need not trade cost for risk with WiKID. To achieve these goals, we utilize Internet-enabled devices, strong, published cryptography, and open-source tools. Our infrastructure, using software and connected intelligent devices, provides the flexibility to solve security issues corporations now face. Our architecture features a request-response mechanism with valid passcodes given only to valid requests. Features include: Easy to use web-based management Replication for fault-tolerance Highly scalable architecture Each server supports multiple security domains pointed at difference network resources Each client supports of multiple domains - across multiple servers Each user can have multiple clients in different locations Configure passcode lifetime, PIN length, max bad PIN attempts and max bad passcode attempts by domain Automated user validation based on existing trusted credentials No hardware token required;can be run from a USB token Easier to use and more extensible than, yet as secure as a key fob token More secure and easier to implement than client certificates Extensible across multiple enterprises Perfect for web-based applications, remote access and non-employee strong authentication Open source, with commercial support available. Try it now here

Industry

Horizontal IT Infrastructure

Red Hat Certifications

This product has been certified to run on the following Red Hat products and technologies:

Target Product Level
Red Hat Enterprise Linux 5.x Self-Certified
Red Hat Enterprise Linux 6.x Self-Certified