Skip to main content

Authentication factors

Utilising patented PINsafe® technology, the AuthControl Sentry’s range of authentication factors provide ultimate security and usability.

 

 

A comprehensive range of authentication methods

Swivel Secure have developed AuthControl Sentry® to authenticate users’ access to applications utilising a wide range of methods – authentication factors.  Whether your organisation still requires traditional hardware tokens, or stakeholders prefer to use mobile apps or biometrics (fingerprints), Swivel Secure can deliver an extensive range of authentication factors to optimise user adoptions during deployment.

Image authenticators

TURing, PINpad® and PICpad image authenticators are underpinned by the patented PINsafe® technology. Whether you are accessing an application internally, or through a VPN or VDI, our range of image authenticators provide a visual representation of the PINsafe® protocol for ultimate security.

Find out more
man sitting with laptop computer isolated screen at desk room

Mobile authenticators

AuthControl Mobile® is one of the most popular ways for organisations to authenticate access to applications because it utilises stakeholders' existing mobile phones, meaning there are no additional costs to the business. There is a range of mobile authenticators to choose from including the PUSH notification, the one-time code (OTC) option, and OATH within the mobile app, which operates in a similar way to the traditional hardware token.

Find out more

Biometrics authenticators

Utilising one of the latest authentication factors - biometrics - users can authenticate using their fingerprint. Streamlining user logins, fingerprint authentication can be implemented by either using the NITGEN fingerprint access controller or by using an HP, Dell and Lenovo computer with fingerprint functionality.

Find out more

Hardware token

The traditional way of utilising the hardware token to authenticate access to an application through a VPN is still an option with AuthControl Sentry®. This reliable way of authenticating is still a requirement for organisations that don't allow mobile phones on site.

Find out more

AuthControl Voice

AuthControl Voice provides users with an extensive range of methods to authenticate including Voice. Providing auditory functionality for PUSH and one-time code (OTC), Voice enables users to authenticate when the use of mobile or a physical token may not be permitted.

Find out more
Office worker speaking on the phone