First North America, then Russia, now Latin America: Demand for two factor authentication to secure
Web sites and web applications are increasingly being used by enterprises to communicate with their employees, customers, suppliers and partners. Some of this information will be confidential and will need protecting with strong authentication.
The Swivel platform can be deployed to enable tokenless authentication for access to web sites/applications; be it allowing secure enterprise-to enterprise communications (eg via Outlook Web Access or via an Extranet), or between an enterprise and its customers or partners, via a customer portal or e-commerce site. Swivel can be used to protect the whole website or just certain areas of the site. It can be used to enforce two-factor authentication if required or a mixture of strong and two-factor authentication.
Swivel authentication is applied by installing a filter onto the website or web application. This filter examines which url the user is trying to access and looks to see if they have completed a Swivel authentication.
If the user is trying to access a secure page and has not yet authenticated, they will be redirected to an authentication page to complete their authentication. Once the authentication is complete, the user is allowed access. We have a range of web application and webserver filters available. These filters use the Swivel Agent XML API to integrate with the core platform.
We have a number of integration guides, available on our knowledgebase that explain the steps required for web integration.
Please contact email@example.com to discuss specific requirements. If you are a web developer and would like to add Swivel support to your products, we will be happy to discuss working with you to develop a solution.
A key, and unique feature, of our authentication platform is our patented one-time-code extraction protocol PINsafe. PINsafe combines the use of registered PINs with random 10 digit security strings that are sent to you either by browser, mobile app, SMS and telephone either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Learn More