Today organizations are struggling with increase online identity frauds and this has shunned customers into performing transactions online. Together with government's regulatory combined with innovative identity attacks such as phishing, man-in-the-middle(MITM),man-in-the-browser (MITB) and other malware, organizations are facing pressure to improve its security and customer's privacy while not sacrificing the convenience of their customers. Basic identity credential such as Login ID and Password is no longer sufficient to protect their customer's privacy and security and needs to deploy advanced identity and strong authentication solution to ensure only authorized users gain access to their system.
UPASS Multi-Factor Authentication Suite is designed to minimize identity frauds and supports for high performance environment and it is also one of the design criteria to be lightweight and easily implemented in short time and cost effectively. The solution is scalable and can be deployed in High-Availability Environment already in use in operating platform like IBM AIX, Oracle Solaris, Red Hat Linux, or Microsoft Windows operating platform and hardware security components like HSM from Thales, or even security tokens firm like Gemalto, OneSpan (formerly Vasco). UPASS complies to financial regulatory guidelines from numerous countries both in Malaysia and ASEAN countries.
Available Authentication Methods
UPASS Mobile Token: The revolution security tokens.
Dynamic Authentication Image based on User ID and Time
The UPASS Mobile Token will generate Dynamic Authentication Image based on User ID and Time. This dynamic image generator is an enhancement to the old static image verification method.
Static Image Verification Method
We also offer separate Security Tokens solutions for your 2-Factor Authentication.
The One-Time Password is used to provide additional challenge to the user if UPASS detects suspicious log-ins. This is to further strengthen the authentication to protect the users.
Transaction Data Signing
An authenticate method for transaction data authenticity with a challenge issued by enterprise server with response generated by Mobile Token.
The implementation of appropriate level of risk-mitigating assurance for resources access by requiring users to further demonstrate that they are who they say they are.
This is known as "step-up" authentication. It is a process of gathering users, devices and their location attributes and evaluate in the context of risk-based policies.
UPASS Key Benefits
Want to know more?
Contact us and find out how our OnlineApps: Multi Channel Banking Solution could enhance your internet banking functionalities and subsequently provide banking convenience to your customers in a secure manner.