Reportstar Technologies provides Strong Authentication and One-Time Passwords based on the world leading Identikey Technology, which supports many various types of authentication tokens.
Built with the customer in mind, the IDENTIKEY Authentication server provides support for hardware, software, zero footprint, e-signatures and mobile authentication right out-of-the-box. It is scalable to accommodate large and small implementations—all without the headaches commonly associated with the maintenance of multi-factor authentication systems.
Authentication and transaction validation functions can be integrated into Firewalls, Servers, all radius supported solutions, Outlook web access (OWA) and many existing web-based applications using a built-in SOAP API.
Remote and internal users identity can be quickly established with an individually assigned DIGIPASS token. The DIGIPASS device generates a unique one-time password (OTP) that replaces insecure static passwords.
We have various authentications tokens types :
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Dramatic growth in the use of cloud-based email for the enterprise brings with it an array of security risks, including susceptibility to sophisticated attacks such as ransomware, phishing and...
Real-time analysis of security alerts generated by applications and network hardware events and logs provide valuable security information and triggers. Reportstar Technologies SIEM solutions pull...
Ensure maximum usage and return on IT investments with quick identification and alerting of problems 24 x 7. Reportstar Monitoring Service provides your enterprise with real-time, 24x7 monitoring and ...
The compliance platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment. This analytics...
Secure your perimeter from risky activity, suspicious traffic, and advanced threats.
Reporstar Technologies make use of perimeter defense technologies like Next Generation Firewalls, Intrusion...
Zoom in on security control gaps with comprehensive network modeling and cutting-edge attack vector analytics. Create a model of your attack surface by collecting data from all network devices and...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions