Skip to main content

Authentication factors

Utilising patented PINsafe® technology, the AuthControl Sentry’s range of authentication factors provide ultimate security and usability.

Watch the custom MFA chain Video

A comprehensive range of authentication methods

Swivel Secure has developed AuthControl Sentry® to authenticate users’ access to applications utilising a wide range of methods – authentication factors.  Whether your organisation still requires traditional hardware tokens or stakeholders prefer to use mobile apps or biometrics (fingerprints), Swivel Secure can deliver an extensive range of authentication factors to optimise user adoptions during deployment.

Image authenticators

TURing, PINpad® and PICpad image authenticators are underpinned by the patented PINsafe® technology. Whether you are accessing an application internally, or through a VPN or VDI, our range of image authenticators provides a visual representation of the PINsafe® protocol for ultimate security.

Find out more
man sitting with laptop computer isolated screen at desk room

Mobile authenticators

AuthControl Mobile® is one of the most popular ways for organisations to authenticate access to applications because it utilises stakeholders' existing mobile phones, meaning there are no additional costs to the business. There is a range of mobile authenticators to choose from including the PUSH notification, the one-time code (OTC) option, and OATH within the mobile app, which operates in a similar way to the traditional hardware token.

Find out more
Mobile Authentication by AuthControl Sentry® Multi-Factor Authentication

Biometrics authenticators

Utilising one of the latest authentication factors - biometrics - users can authenticate using their fingerprint. Streamlining user logins and fingerprint authentication can be implemented by either using the NITGEN fingerprint access controller or by using an HP, Dell and Lenovo computer with fingerprint functionality.

Find out more
Bio-metric Authentication by AuthControl Sentry® Multi-Factor Authentication

Hardware token

The traditional way of utilising the hardware token to authenticate access to an application through a VPN is still an option with AuthControl Sentry®. This reliable way of authenticating is still a requirement for organisations that don't allow mobile phones on site.

Find out more
Hardware Token Authentication by AuthControl Sentry® Multi-Factor Authentication

AuthControl Voice

AuthControl Voice provides users with an extensive range of methods to authenticate including Voice. Providing auditory functionality for PUSH and one-time code (OTC), Voice enables users to authenticate when the use of mobile or a physical token may not be permitted.

Find out more
Voice Authentication by AuthControl Sentry® Multi-Factor Authentication

Promote maximum user adoption with
an extensive range of authentication factors

  • This field is for validation purposes and should be left unchanged.