Swivel Secure would like to say a big thank you to all its customers who
We have worked with personalised desktop environments for many years, ensuring users have secure and rapid access to a range of services and applications.Such an environment is a powerful way of providing remote access to users. It allows the users to be presented just the access they need. Remote access of this kind requires the use of strong authentication.
Swivel authentication can be added to such desktop applications, including Windows Remote Desktop, Terminal Services, Ericom and Citrix Xen App. Our authentication can also be added to users’ personal computers, creating an extra level of strong authentication, whether the computer is in the office or at a remote location.
Virtual Desktop solutions are often integrated with Swivel in a similar manner to VPN integration (eg in the case of Citrix Web Interface, Ericom, VMWare View and UAG).
Windows Terminal Services and Desktop solutions are different. In these cases a Swivel filter is installed on the Windows server (called a Credentials Provider). When a user logs onto the desktop (real or virtual) they are prompted for their Active Directory (AD) credentials and their Swivel Credentials.
The filter checks the users Swivel credentials. If these credentials are correct it passes the AD credentials to the AD server. If these are also correct the user is granted access.
We have a number of integration guides, available on our knowledgebase that explain the steps required for different desktop integrations.
Please contact email@example.com to discuss specific requirements. If you are a (virtual) desktop vendor and would like to add Swivel support to your products, we will be happy to discuss working with you to develop a solution.
A key, and unique feature, of our authentication platform is our patented one-time-code extraction protocol PINsafe. PINsafe combines the use of registered PINs with random 10 digit security strings that are sent to you either by browser, mobile app, SMS and telephone either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Learn More