In-depth Information and Video Resources
We offer a wealth of resources. These include Whitepapers with helpful insights into the data security arena,
Data Sheets to help you learn more about our products and solutions, as well as videos to show our products,
integrations and authentication factors in action.
Find definitions for some of the common terms you’ll find around our website over on our glossary page.
Salesforce OTC Video
Demonstration video showing the one-time code (OTC) on the mobile app, authenticating access to Salesforce.
TURing Citrix NetScaler Video
Demonstration video showing the TURing image, authenticating access to Citrix NetScaler.
Office 365 PUSH Authentication Video
Demonstration video showing PUSH on the mobile app, authenticating access to Office 365.
Government Cyberattacks Video
A government security solutions video showing the 7 Biggest Government Cyberattacks in the last 7 years.
PINsafe® Demo Video
A demonstration video providing an overview of the patented PINsafe® technology and how it is utilised to provide ultimate security.
Risk-based Authentication Demo Video
A demonstration video providing a comprehensive overview of the Risk-based Authentication process, policies and calculations.
Create a custom MFA chain
Demonstration video showing how easy it is to create a custom MFA chain using the RBA policy engine.
Tips for securing your education network
Andrew Donaldson, regional manager and Adrian Jones, CEO, discuss how education facilities use their IT systems and networks, looking at the common cyber challenges the industry faces and offer their advice for securing an education network.
6 Things that may surprise you about some multi-factor authentication solutions
Do your research before investing in a multi-factor authentication solution. Here are 6 elements that you should consider when choosing the right platform.
Securing the Cloud: The future of Authentication – Survey Results
What is the role and future for Multi-Factor Authentication as cloud networks and apps become more prominent? We asked IT pros for their experience.
Find out everything you need to know about AuthControl Sentry by downloading our comprehensive brochure
Learn more about the technology behind our products by downloading one of our Datasheets.
Find out how we support and protect you with our terms and conditions.