Reportstar Technologies provides Strong Authentication and One-Time Passwords based on the world leading Identikey Technology, which supports many various types of authentication tokens.
Built with the customer in mind, the IDENTIKEY Authentication server provides support for hardware, software, zero footprint, e-signatures and mobile authentication right out-of-the-box. It is scalable to accommodate large and small implementations—all without the headaches commonly associated with the maintenance of multi-factor authentication systems.
Authentication and transaction validation functions can be integrated into Firewalls, Servers, all radius supported solutions, Outlook web access (OWA) and many existing web-based applications using a built-in SOAP API.
Remote and internal users identity can be quickly established with an individually assigned DIGIPASS token. The DIGIPASS device generates a unique one-time password (OTP) that replaces insecure static passwords.
We have various authentications tokens types :
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Interpret your Internet gateway's log files to deliver useful reporting to firewall administrators, department managers, HR departments and YOU. Generate Overview Reports or detailed Activity Reports ...
The core feature of SIEM technologies is the ability to gather security data from the critical assets residing on your network and to present that data as actionable information. Reportstar...
Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and...
A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment. Reportstar Technologies solutions provide a detailed analysis of the state of your...
Secure your perimeter from risky activity, suspicious traffic, and advanced threats.
Reporstar Technologies make use of perimeter defense technologies like Next Generation Firewalls, Intrusion...
Dramatic growth in the use of cloud-based email for the enterprise brings with it an array of security risks, including susceptibility to sophisticated attacks such as ransomware, phishing and...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions