idenprotect Enabled Desktop

idenprotect’s Password-Free Technology for Desktop Platforms

With support for Windows, MacOS and Linux, idenprotect provides a simple, consistent and secure authentication solution that will be embraced by IT users throughout your organisation.

Does your organization require users to access their desktop and laptop computers with a password? If so, you will be familiar with the problems this causes. Research suggests that on average a user wastes 24 hours per year logging in instead of working on the things they have been hired to do. There is a clear opportunity for organizations that are looking to increase efficiency and to cut down on waste.

Unfortunately, far from improving efficiency many organisations feel compelled to move in the opposite direction. In a bid to counter the growing menace of cyber threats, many IT departments opt to enforce further security controls, such as making passwords more complex or reducing password’s lifetimes, requiring the user to change them more frequently. Regrettably this leads to significant user dissatisfaction, marked increases in IT spending in managing and supporting many more password resets and unlocks. As an unintended but understandable consequence of further controls being applied many users decide to write down their passwords or share them, further amplifying security issues.

Working with the native features and standards within today’s desktop platforms, idenprotect’s desktop client plug-in for Windows, MacOS and Linux ensures a consistent and familiar user experience for your users. idenprotect takes care of the login process and supports a number of authentication protocols including Kerberos and certificate-based authentication, ensuring a fit within your organization.

If you want to save money and free up time for your users by removing the complexities and frustrations of password-based desktop logins, whilst ensuring a higher level of security, then choose idenprotect.

idenprotect for Desktop – Main Features

Computer-Icon-White

Native Platform Look and Feel

Working the way users would expect when they log in to their desktop PCs, iDENprotect’s desktop client with its secure credential provider presents a normal login screen to the user…but without the password

Windows-Icon-White

Support for VDI Environments

Virtual environments are supported so that users who use VDI technology can still enjoy password-free access

QR-Icon-White

Push, QR Code or Mobile Initiated

idenprotect supports a number of authentication and validation methods allowing administrators to specify which method or choice of methods they provide to their users

Mobile-Icon-White

No Mobile Authenticator?

The idenprotect desktop client supports alternative authentication methods to meet the security requirements in scenarios where the use of a mobile device is prohibited from use within the organization, for example, a locked-down network

Laptop-Icon-White

Cross Platform Capabilities

Supporting Windows, MacOS and Linux to provide a password-free experience to your users

Slider-Icon-White

Offline Authentication

The security is decentralized and can operate and authenticate without a network connection to allow protected access to offline applications

Offline Authentication

Thanks to its decentralized password-free technology, idenprotect provides secure offline authentication to applications when an internet connection may not be available. This is vital for people that travel frequently on aeroplanes or in areas where there is a poor data signal and no Wi-Fi.

Using the Security and Trust of Public Key Cryptography

The problem with today’s 2FA solutions, passwords and shared secrets is that the secrets need to be held or input in two different places, further increasing the attack surface that is vulnerable to a credential compromise. Public Key cryptography eliminates the need for a secret to exist in two places. Providing the security controls are strong and robust in protecting the “private” key, credentials cannot be hacked, stolen, phished or guessed. idenprotect enforces Public Key security standards and uses Public Key cryptography to securely replace passwords and shared secrets.

End Password Sharing Amongst Users

Many organizations have suffered a data breach as a result of a user writing down a password and keeping it close to, or attached to their desktop monitor or laptop, or from them sharing their credentials with another person. An idenprotect solution prevents this activity from taking place by removing the password and using multifactor, biometric based authentication instead. The user no longer has to remember their password and because they no longer know their password, they cannot share it. Not only will this protect your organization from a credential compromise, it will quickly allow you to comply with your security policy.

Remotely Revoke and Wipe Access

If a device is lost or stolen, the idenprotect application and the security within can be revoked remotely to prevent the unlikely event of unauthorised access. The application can also be wiped from the device remotely.

No Back-ups Required

Unlike many other mobile security solutions, idenprotect does not require the user to back up their idenprotect application. The idenprotect application and the security can be redeployed in seconds if a device needs to be wiped or the user has to replace it.

What idenprotect can do for You

Passwords-Icon-White

Prevent credential compromise by eliminating passwords

Over 80% of data breaches are a result of
compromised passwords. idenprotect’s advanced public-key cryptography and decentralized security model replaces password-based authentication, therefore reducing risk.

Group-Icon-White

Provide a simple and seamless user experience for all users

Free up your user’s time to work on more important things once they no longer have to face the frustrations and complexities of logging into multiple applications with multiple passwords on
a daily basis.

Exlamation-Icon-White

Securely validate all user identities to prevent unauthorised access

Using real-time smart intelligence to build a deeper context of who the user is, the device they are using, where they are located at time of access and any changes in their immediate environment that may pose a security risk.