Reportstar Technologies provides Strong Authentication and One-Time Passwords based on the world leading Identikey Technology, which supports many various types of authentication tokens.
Built with the customer in mind, the IDENTIKEY Authentication server provides support for hardware, software, zero footprint, e-signatures and mobile authentication right out-of-the-box. It is scalable to accommodate large and small implementations—all without the headaches commonly associated with the maintenance of multi-factor authentication systems.
Authentication and transaction validation functions can be integrated into Firewalls, Servers, all radius supported solutions, Outlook web access (OWA) and many existing web-based applications using a built-in SOAP API.
Remote and internal users identity can be quickly established with an individually assigned DIGIPASS token. The DIGIPASS device generates a unique one-time password (OTP) that replaces insecure static passwords.
We have various authentications tokens types :
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
The core feature of SIEM technologies is the ability to gather security data from the critical assets residing on your network and to present that data as actionable information. Reportstar...
Zero-day and ransomware protection against advanced attacks for your devices including identifying hosts with infected bots. Prevent, protect and quickly respond to advanced attacks including sending ...
Versatile log file analysis optimized for network usage reporting to get the right report delivered to the right person. Network devices generate huge amount of log files that can be turned into...
Get complete visibility into changes, data access and data usage on file servers with security intelligence about all changes made to files, folders, shares and permissions together with file access...
Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and...
Secure your perimeter from risky activity, suspicious traffic, and advanced threats.
Reporstar Technologies make use of perimeter defense technologies like Next Generation Firewalls, Intrusion...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions