What we do

Easily protect all customers against modern attacks and scams.

Features

QUICK OVERVIEW

Humans cause almost all your cyber problems.
Now you can fix that.

Hate passwords? so do we - they are distracting and useless - get rid of them safely with CryptoPhoto.

Protect your staff and users against their largest security threat: Themselves.

Trust is a two-way street.  Activate 2-way mutual-authentication with CryptoPhoto.

Quickly plug supplier security risks with one fast, easy, and comprehensive solution.

Make high-security authentication and signing fast, easy, and convenient.

Prevent your staff and suppliers from being trickable by sophisticated adversaries.

Contain malware and breach damage with segregated integrity-based multi-device key provision.

Block Phishing

More than half of all break-ins start from phishing.  CryptoPhoto blocks them.  No matter how devious the scam, no matter how inexperienced your users, our mutual authentication system keeps everybody safe.

Neutralize Malware

Countless thousands of people wrote the programs and apps running on all your computers.  Do you trust them all? Are hackers exploiting their security flaws? CryptoPhoto’s transaction-signing blocks their damage.  It also warns instantly when you come under attack, and protects you from dishonest customers too.

NIST SP800-63-3 AAL3

CryptoPhoto is built specifically to protect people against scams, or in other words, to provide "Verifier Impersonation Resistance", the key requirement needed to meet the world's strongest-rated Authentication Assurance Level: AAL3.  Now is the time to stop playing "security theatre" with one-time and two-step or OTP codes: update to CryptoPhoto to enjoy genuinely effective authentication security.

Make Logins Easy

We are the world’s easiest security.  Pre-school kids, grandparents, and everyone in-between can understand and authenticate first time, without training or help.

Goodby Passwords

CryptoPhoto provides the option to get rid of passwords.  Most experts agree: passwords cause more harm than good.  Please your users and sysadmins alike: move safely away from passwords completely.

Please Your Users

Every second counts for your customers and staff.  CryptoPhoto makes login fast.  Very fast.  If you choose to go passwordless, CryptoPhoto is even faster than not using CryptoPhoto at all.

Safe .vs. Secure

What's worse: hackers getting in, or accidentally locking yourself out?  CryptoPhoto cleverly prevents both, which also prevents social engineering scams, like impostors who pretend to be you with a lost or forgotten second factor.  We support multiple devices per user, multiple accounts per device, multiple users per device if necessary, all with in-device biometric encryption, optional passphrase security, and secure self-service enrolment and lost-device recovery.  Your users can safely recover, by themselves, if they lose/break/etc their primary devices - with no security reduction, no social-engineering risks, and no help-desk costs.

Mutual 2FA/MFA

Our second/multi-factor authentication works in both directions, proving you to your user, at the same time as your user proves themselves to you.  Also known as "Verifier Impersonation Resistance", and compliant with NIST SP800-63-3 to AAL3 strength (the world strongest authentication level), this blocks phishing, social-engineering, malware, man-in-the-middle and other traditionally difficult-to-stop common attacks.
We're also the world's easiest and fastest high-strength security, taking less than 2 seconds, needing no training, and suitable for users of every skill level.

Console Protection

Adding intrusion-resistant second-factor for console access is quick and easy with CryptoPhoto.  It self-opens on-demand, and is so quick that sub-2-second (yet still AAL3 high-strength) logins are easy.  Examples include SSH, Remote-Desktop, su/sudo, CLI, admin and operator consoles across servers and appliances alike.  If it's got a login, CryptoPhoto can easily add rapid second-factor protection to it.

In-Person Multifactor

Do you meet users face to face? CryptoPhoto also works perfectly in-person too! As with all CryptoPhoto operations, this includes full mutual-authentication as well.  Your users cannot be fooled by someone impersonating you, and nor can you be fooled by an impostor impersonating your users.

IoT / SCADA

In-bound multifactor-authentication is easy with CryptoPhoto.  You can add high-security control to everything from home or office doors and facility equipment, to critical-industry process machinery, and everything in-between.  CryptoPhoto is equally at adept receiving secure instructions to confirm, as it is to originate secure multi-factor-signed instructions on-demand.

Multi-Operators

Are you paranoid? Do you have critical operations that no single operator should have the power to perform alone?  All CryptoPhoto functions, including authentication, transaction-signatures, and cryptographic key provisioning, support "two man rule" counter-party approvals (or denials).  You nominate how many approvals are needed, and the pool of users authorised, and CryptoPhoto securely enforces access.  Want to give one or more users the power of veto?  This too is easy with CryptoPhoto.

Sign Anything

Malware is hard to get rid of, but easy to defeat with CryptoPhoto out-of-band digital signatures.  If you process instructions from your users, like moving money, transferring domains, updating account details, erasing files or virtual servers, downloading backups, online trading, etc - CryptoPhoto gives both you and your users an easy, one-tap-fast solution to rapidly check and approve critical actions: out of reach of malware, and also out-of-reach of hackers and social-engineers alike: All CryptoPhoto actions are mutually-authenticated.

Telephone Multifactor

Do you get phone calls from your users, or do you need to phone them?  CryptoPhoto works perfectly over the phone as well - and like all CryptoPhoto operations, supports full mutual-authentication as well.  Your users know for certain that you are legitimate, and you know for certain that they are the real users.  Say "no more" to social engineering attacks against your help desk and also "no more" to social-engineering of your users.

End credential theft

It's a sad fact that even though it's 2018, credential-compromise attacks like phishing, social-engineering, scams and password-stealing malware are still the root cause behind 9 out of every 10 cyber-intrusions and serious data breaches.  You need to deploy serious protection - such as NIST-compliant AAL3 authentication with verifier impersonation resistance - to reliably put a stop to all those.  CryptoPhoto supports all this, with the industry's fastest and easiest AAL3-compliant protection available.

Extensible authentication

Imagine having a real-time, two-way, high-security second channel direct to your users 24/7 - where you can push rich full-screen messages and receive secure biometric-protected signed responses back, all with ease.  CryptoPhoto's suite of plugins, sample downloads, APIs and extensive documentation and examples helps you add new and exciting high-security features to your products and services.

API and Crypto key release

Some secrets should never touch hard disks. You can use CryptoPhoto signing to provision critical data on-demand - like full-disk encryption keys for secure remote-server boot, or API keys for trading bots, or unlock keys for digital certificates.  Our secure second-device storage guarantees that your critical systems minimise any single-point-of-failure security risks.  For the truly paranoid, multiple operators can be involved to approve key release actions, and multiple redundant devices can be provisioned to prevent key loss.

Who is using CryptoPhoto

Get Started