Conventional authentication using password-based methods is vulnerable to phishing attacks and can result in identity theft and pharming through the forging of the target Web page. Adopting technologies to strengthen these methods and to support others providing more secure authentication is essential for preventing identity theft and for making the authentication process and, therefore, the relationship between the parties more reliable and trustworthy.

A wide range of authentication methods are available (username and password, soft token, hard token, PKI credentials, biometrics, etc.) that provide different levels of assurance (LoA*). However, it can sometimes be difficult to implement more reliable methods owing to them being not very user-friendly or a sharp change from our familiar use habits. This difficulty is even greater when we try to change the methods used by our clients.

Safelayer's TrustedX Adaptive Authentication platform supports the majority of methods and combinations of them and also enables implementing the less common ones. Furthermore, its risk assessment capability (through the analysis of user context factors) means the platform can make decisions based on previously defined policies to bolster the method used.

The authentication policies can determine, individually for each application and according to the risk calculated, whether to grant or deny access following the prompting for a second authentication factor using a different method. Depending on the access device (desktop, tablet or mobile, etc.), a particular behavior can be established in the authentication policy.

More Than Just Strong Authentication

Safelayer's position and experience in the financial and insurance sectors has allowed us to create a complete range of security solutions in our fields of expertise: digital identity, electronic signature and data protection. We complement the potential and versatility of our TrustedX Adaptive Authentication platform with:

  • TrustedX Electronic Signature for providing business applications with the PKI functionality required for implementing the electronic signature (transactions, contracts, parties, orders, etc.).
  • TrustedX Encryption Key Management for providing the applications and users of the services with data encryption/decryption key management.
  • KeyOne PKI Platform for providing all the components for managing PKI credentials in user desktop and mobility environments.

(*) See the level of assurance classification of the National Institute of Standards and Technology (NIST) Special Publication 800-63-1 "Electronic Authentication Guideline" and/or ITU-T X.1254 / ISO/IEC 29115 classifications.

Related Products

Related Solutions

  • ERROR MENU 507
  • ERROR MENU 510


Mobile World Congress
February 25 - 28, 2019 | Barcelona, Spain

Smart City Expo World Congress
November 13 - 15, 2018 | Barcelona, Spain

World eID and cybersecurity
September 24 - 26, 2018 | Marseille, France

September 3 - 7, 2018 | Barcelona, Spain

Security Document Worldecurity Document World
June 25 - 27, 2018 | London, United Kingdom

Digital Trust & Paperless Conference
April 24, 2018 | Prague, Czech Republic

RSA Conference
April 16 - 20, 2018 | San Francisco, USA

Govern Digital
March 21 - 22, 2018 | Barcelona, Spain

Mobile World Congress
February 26 - March 1, 2018 | Barcelona, Spain

Jornadas CERES
February 7 - 8, 2018 | Madrid, Spain

November 28 - 30, 2017| Cannes, France

World eID and Cybersecurity
September 25 - 27, 2017 | Marseille, France

Security Document World
June 26 - 28, 2017 | London, UK

eSignature in Public Administrations
June 7, 2017 | Madrid, Spain

June 5 - 7, 2017 | Szczecin, Poland

May 21 - 23, 2017 | Dubai, UAE

We use cookies to improve our website and your experience when using it. Cookies used for the essential operation of this site have already been set. To find out more about the cookies we use and how to delete them, see our Privacy Policy.I accept cookies from this site