United States - ENGLISH
Argentina - ESPANOL
Brazil - PORTUGUESE
Canada - ENGLISH
Canada - FRENCH
Chile - ESPANOL
Costa Rica - ESPANOL
Ecuador - ESPANOL
El Salvador - ESPANOL
Honduras - ESPANOL
India - ENGLISH
Paraguay - ESPANOL
Peru - ESPANOL
Portugal - PORTUGUESE
Russia - RUSSIAN
Spain - ESPANOL
United Kingdom - ENGLISH
Uruguay - ESPANOL
Once users have access to a portal or applications, it is important to identify that the same users are returning in order to maintain security of the system and guard against account take-over, data loss and theft. Multifactor authentication is a simple yet secure way of knowing who is using your applications and ensuring that they are exactly who you expect them to be.
Our strong, multi-factor authentication product offers a range of layered, secure authentication methods in a single integrated platform. It delivers secure one-time passcodes via multiple vectors:
Out-of-band delivery of quickly expiring, one-time passcodes confirms that the person possessing the passcode is the one attempting to access your systems. Multiple authentication vectors ensure high-level security with user-required flexibility and usability.
If a biometric method is required or desired, two-factor authentication can also be done through voice biometrics – a secure, software-based method that doesn't require special hardware or detailed training.
Progressive authentication is our term for the best practice we pioneered—using an integrated set of tools and processes for situation-based authentication of known users seeking access to secure networks, data, and applications.
Based on your policy decisions, our solution will trigger authentication challenges at login or when suspicious transactions, unknown or risky devices, or out-of-norm behavior is recognized. These security authentication parameters can be customized in real-time for users both inside and outside your organization, progressively presenting authentication challenges based upon the latest threat assessment.
Equifax state-of-the-art voice biometric decision engine uses statistical pattern matching techniques, advanced classification methods, and inputs from multiple algorithms to properly verify or identify speakers. It can process millions of transactions in a SAS 70 Type 2, PCI Level 3 DSS compliant, high availability environment.
The ability to uniquely model and identify an individual's voice makes voice biometric software attractive for many authentication scenarios. Anakam.TFA Voice Biometrics can accommodate environmental voice fluctuations and match individuals with a high degree of accuracy.
To create a voiceprint, users repeat several simple phrases. This one-time process takes only one minute. Enrolled users will be asked to repeat one simple phrase during all subsequent calls. This phrase is compared to their stored voiceprint to determine a 'pass' or 'fail' result. The process takes about 10 seconds.
The Anakam.TFA server will synchronize with your existing Identity Management system such as LDAP, Active Directory, Novell eDirectory, as well as API methods for customized implementations. Our OATH standards-based platform delivers secure two-factor authentications to both your internal and external user communities while helping meet Federal requirements.
Anakam.TFA delivers support for the OATH (HOTP) authentication modes using a time-based algorithm that cycles pseudo random numbers (6-digits) every 60 seconds. The OTP token is seeded using a unique key provided to the server components and assigned to the specific user in the database.
The user's token has the same seed or key value stored in tamper-proof RAM inside the physical token or encrypted within the soft token Java application. Our OATH platform does not keep the seed keys, thereby eliminating a single-source location where seed records could be attained. This denies fraudsters the ability to tie a user to a token seed record.