Quickly plug supplier security risks with one fast, easy, and comprehensive solution.
CryptoPhoto is a fast and easy-to-use multi-featured mutual (2-way) authenticator with AAL3*-grade high security, transaction signing, and out-of-band cryptographic key provisioning capability. It can replace legacy 2FA and other ineffective login tools/gadgets. It also delivers a wide range of useful new security capabilities. It works both out-of-band (e.g. for Computer access) as well as in-band (e.g. authentication and secure control of SCADA, IoT, or screen-less devices), and it works online and offline, as well as in person, over-the-phone, and for any kind of machine access.
CryptoPhoto is significantly different to competing and legacy authentication and signing technologies in two important areas: User Experience, and Security Breadth. CryptoPhoto is easy, very fast, convenient and versatile. It is also near foolproof, since it is specifically designed to protect people against even their own fallibility, while taking clear, simple, and effective steps to address all the typical authenticator "out of scope" problems like rapid secure enrolment, secure loss handling, secure self-service provisioning, prevention of social-engineering attacks against both users and administrators, malware, and recovery exploits.
63% of Defence cyber breaches originate from 3rd party networks. 91% of all cyber breaches are attributable to Human-factor exploits, like spear-phishing, social-engineering, or credential-theft malware. CryptoPhoto is easily installed either by you, or your 3rd parties, and is strongly effective against a comprehensive range of leading cyber threats.
We combine the industry's highest-security-rated and most effective cyber threat eradication technology with the industry's easiest and fastest user experience to give Defence and their suppliers the best possible User protection.
* NIST Special Publication 800-63 Revision 3
Authenticator Assurance Level 3 (AAL3) provides very high confidence that the claimant controls authenticator(s) registered to the subscriber. Authentication at AAL3 is based on proof of possession of a key through a cryptographic protocol. AAL3 is like AAL2 but also requires a “hard” cryptographic authenticator that provides verifier impersonation resistance.