m2s

Two factor authentication service

Is your access policy compromised?

Having someone steal a password from your organization is easier than you might think.

With any of these common actions, any user could run the risk of being stolen the password:

  • Use the same password in more than one site
  • Download software from internet
  • Click on e-mail message links
  • Open attached documents
  • Plug an USB device to the computer
  • Connect to public/external Wi-Fi networks

If someone steals a password and accesses your system, he can get sensitive data, erase information and cause damage that can impact your business and your reputation.

Are you completely sure than a password from your organization will never be stolen?

2-Step Authentication will protect your system from malicious users even if they have stolen a password.

2-Step Authentication


two step authentication

An additional protection layer

Most systems only have one security layer, the password, to secure the access.

With two factor authentication if a hacker breaks the security layer of the password, he still needs the authenticated user's smartphone to access to your system.

If the user's phone is stolen, the device can be deactivated on the platform so it will not be useful to access the system.

Validated phone needed to access

With two factor authentication you will protect your system with something user knows (his password) and something he owns (his smartphone with a validated app).

If the user's phone is stolen, the device can be deactivated on the platform so it will not be useful to access the system.

two step authentication
two step authentication

Real time generated codes

Codes are created on demand and are sent to user's phone through a secured SSL connection to avoid sniffers and 'man in the middle' attacks.

Geolocation validation

If geolocation validation is enabled, even if the users use the app from their verified devices, they will not be able to access the site if they are outside the allowed zones.

This way you can prevent users from accessing the site outside the work area in cases where the access policy establishes it.

geolocation

Amateurs hack systems, professionals hack people.

Signum Pass protects against most attacks

Criminals use various attack techniques to steal data from devices. Signum Pass offers a 100% protection against most of them.

Brute Force

In a brute force attack an individual or a large botnet of infected machines generate millions of combinations to access the accounts. Brute force is the oldest attack vector.

All login forms can be attacked with brute force.

Signum Pass protects against brute force, as the attack never exceeds 2-step authentication.

Man in the Middle (Bucket Brigade)

In a man in the middle attack, an attacker intercepts communications between the users and the site where they’re logging in.

Attackers steal secrets in transit.

Signum Pass is not vulnerable to this attack, as communication with the device is safe and each validation is generated in real time.

Keylogging

In a keylogging attack, the attacker installs malware on a device that records the user's typing to steal passwords or sensitive information.

Keyloggers steal passwords.

Signum Pass generates single-use codes and has functionality in which the user does not have to type any code.

Phishing

In a phishing attack, a criminal tries to collect sensitive information such as user names, passwords and bank data, posing as a real entity in an electronic communication.

Phishing takes advantage of weaknesses and carelessness inherent in human nature.

Signum Pass does not use passwords, so this point of attack is obliterated.

Better than SMS

Different companies use two factor authentication based on SMS with a key. The most common example is that of banks when performing an internet operation.

Use Signum Pass is better in all aspects.

Signum Pass is safer

All the information that Signum Pass sends and receives from the user goes through a secure SSL connection, compared to the SMS that are sent in plain text and that can be intercepted by anyone near the user.

Signum Pass is not another attractive feature, it is a key piece in the Access security policy.

Signum Pass is cheaper

Sending SMS on a continuous way is expensive. If you want to protect the access of all users via SMS, it would be prohibitively expensive to send an SMS for every login happening on a site.

With Signum pass the price is not based on the number of logins, but in the number of users of the system. Signum Pass does not rely on the telephone infrastructure, so it offers an unlimited number of logins at no additional cost.

Pricing


Our pricing policy follows the rule pay as you go.

The price is based on the number of users of the system, without added costs by the number of logins.

  • Basic
  • € 1.00 / user / month
  • Without monthly minimum price
  • Up to 349 users
  • Unlimited login codes
  • Customized logo display on App
  • Data analysis
  • Pro
  • € 0.75 / user / month
  • Monthly minimum price: 349.00 €
  • From 350 to 1,999 users
  • Unlimited login codes
  • Customized logo display on App
  • Data analysis
  • Enterprise
  • € 0.50 / user / month
  • Monthly minimum price: 1,499.25 €
  • From 2,000 users
  • Unlimited login codes
  • Customized logo display on App
  • Data analysis

Contact


Signum Software (Spain)
Pº Castellana 91, 4º
28046 - Madrid (Madrid)
España
Tel: (+34)914855529
Signum Software (Italy)
Via Madre serafina, 11
80073 - Capri (Napoli)
Italia
Tel: (+39)3342922697