THE CYLOCK MFA
CYBERSECURITY SOLUTION
An extra layer of authentication to protect the data with ease, strong secure connection. A Second Factor Authentication (2FA) solution that employs mobile devices as authentication factors. Forget expensive and cumbersome tokens, or non-user-friendly SMS OTPs. With this 2FA deployment, management and support get simplified. Achieve up to 40% reduction in Total Cost of Ownership ( TCO ) as compared to hardware tokens. With option of on premises deployment or cloud based 2FA-as-a-Service, you can tailor it to your exact needs. CyLock uses technology your users already possess and are familiar with smartphones and tablets. What’s more, with industry leading feature set and secure Out-of-Band authentication, it stands apart from the competition. Whether you are looking to add 2FA to log-in systems or for transactions, VPNs to SSH, CyLock is the 2FA solution you deserve.

ADVANTAGES
-
No Hardware Required: CyLock is a token-less 2FA solution. So no need for special hardware /token device to generate
OTP during authentication. Authentication is done through end users mobile phone. -
Easy Self Enrollment: Enrolling end-users into a 2FA system is a time-consuming, error prone and costly process. That is why CyLock comes with a convenient, QR code based, self-enrollment feature. With a quick scan of a custom generated QR Code and few taps, your users are automatically enrolled and protected by CyLock.
-
Cloud or On-Premises: CyLock can be deployed either on cloud (AWS or Azure or Google or any other cloud service
provider) or on-premise data center. -
Out of Band Authentication: Avertising modern cyber-attacks such as Phishing, Man in the Middle (MITM) and other
Single Channel attacks require sophisticated 2FA solutions. Existing solutions such as OTP hardware tokens, SMS OTPs, Phone OTPs or even transaction signing tokens do not offer full protection against these attacks. CyLock employs secure secondary channel communication with your enterprise apps and services, otherwise known as an Out-of-Band channel, to overcome such attacks.
.png)