In-depth Information and Video Resources
We offer a wealth of resources. These include Whitepapers with helpful insights into the data security arena,
Data Sheets to help you learn more about our products and solutions, as well as videos to show our products,
integrations and authentication factors in action.
Find definitions for some of the common terms you’ll find around our website over on our glossary page.
Salesforce OTC Video
Demonstration video showing the one-time code (OTC) on the mobile app, authenticating access to Salesforce.
TURing Citrix NetScaler Video
Demonstration video showing the TURing image, authenticating access to Citrix NetScaler.
Office 365 PUSH Authentication Video
Demonstration video showing PUSH on the mobile app, authenticating access to Office 365.
Government Cyberattacks Video
A government security solutions video showing the 7 Biggest Government Cyberattacks in the last 7 years.
PINsafe® Demo Video
A demonstration video providing an overview of the patented PINsafe® technology and how it is utilised to provide ultimate security.
Risk-based Authentication Demo Video
A demonstration video providing a comprehensive overview of the Risk-based Authentication process, policies and calculations.
Create a custom MFA chain
Demonstration video showing how easy it is to create a custom MFA chain using the RBA policy engine.
Tips for securing your education network
Andrew Donaldson, regional manager and Adrian Jones, CEO, discuss how education facilities use their IT systems and networks, looking at the common cyber challenges the industry faces and offer their advice for securing an education network.
Watch more of our demonstration videos to see how easy it is to authenticate access to all of your applications.
AuthControl Sentry® Version 4.1
We are excited to announce the release of AuthControl Sentry® Version 4.1! Updates include: customisable interface, 10 authentication factors which can be configured as a Custom Chain, and PICpad – ideal for multinational companies wishing to set consistent authentication. Learn more about the release of AuthControl Sentry® Version 4.1.
Three easy wins for deploying an independent multi-factor authentication solution in your organisation
With potentially hundreds of applications utilised within your organisation and some major providers now offering their own independent multi-factor authentication (MFA), processes can become fragmented and inefficiencies can start to instill complacency and reluctancy to follow procedures. Read our article on how you could benefit from by deploying an independent MFA solution.
The potential hidden costs of deploying multi-factor authentication in your business
Protecting your business with an authentication solution requires considerable investment. Ensuring you have full visibility of both the initial and the ongoing costs is paramount. Read our article exploring ALL of the potential cost considerations.
6 Things that may surprise you about some multi-factor authentication solutions
Do your research before investing in a multi-factor authentication solution. Here are 6 elements that you should consider when choosing the right platform.
Find out everything you need to know about AuthControl Sentry® by downloading our comprehensive brochures
- AuthControl Sentry Overview Brochure
- AuthControl Sentry Full Brochure
- AuthControl Sentry Brochure German
- AuthControl Sentry Brochure Italian
- AuthControl Sentry Brochure Japanese
- AuthControl Sentry Brochure Polish
- AuthControl Sentry Brochure Portuguese
- AuthControl Sentry Brochure Russian
- AuthControl Sentry Brochure Spanish
- AuthControl Sentry Brochure US Letter
- Education: Securing your network against cyber breaches
- Manufacturing: Securing your factories from online threats
- Healthcare: Securing your healthcare organisation from online threats
Learn more about the technology behind our products by downloading one of our Datasheets.
- Swivel Secure 24/7 Maintenance and Support
- Swivel Secure 8/5 Maintenance and Support
- Integrating AuthControl Sentry with Office 365
- Integrating AuthControl Sentry with Palo Alto
- Integrating AuthControl Sentry with SAP ERP
- AuthControl Sentry
- Swivel Secure Cloud Architecture
- Risk Based Authentication
- SMS Data Sheet
- Mobile App Data Sheet
Find out how we support and protect you with our terms and conditions.