
Finally, a no password solution to keeping your access secure.
Entry provides secure authentication via a pre-authorised and approved Users Device; therefore, bypassing the need for a password. Not only can the Entry platform provide network access security but also specified application access can be secured through the user or admin configuration.
Entry’s authentication platform offers customers a straightforward authentication experience by using mobile devices that users are already comfortable with and provides significantly more secure authentication. Specific transactions can trigger authentication from third parties, with the use of their authenticated devices, therefore removing passwords in the whole chain of events.
We have all heard about the various cyber crimes occurring across the globe. Such as one-time pin vulnerabilities through SIM swapping, credential theft allowing criminals to reset passwords, lock the victim out of the account, download private data, gain access to other computers in the network or wipe the victim’s data and backups. Entry is the perfect solution to remove all these security vulnerabilities and truly secure your environments.
Pins, codes and tokens all continue despite their drawbacks because an all-encompassing solution did not exist; this is no longer true as Entry has revolutionised security.
Download Entry now For free from the App STORE or google play
Contact us to have entry integrated into your network or applications
Synapser solution:
At Synapser we love solving complex problems and have created a product that focuses on securing the access to your network and individual applications, thereby ensuring your data is safe.
We have changed the digital security paradigm by rethinking the password. In doing so, we can secure the identity and online authenticity of our clients, enabling us to solve our clients various digital personal/business access requirements and addressing user and data access issues that get compromised in a connected world.
Entry:
Our product, Entry is a mobile device based, multi-factor authentication system, which turns the user’s phone into the “password” authenticator and can be integrated with software applications.
The key in Entry’s multi-factor authentication system is the unique way it creates a ‘digital DNA’ of the Device that is then used against future interactions throughout the system to ensure the person is who they claim to be.
Entry not only requires the Device to be verified and authenticated through the use of digital DNA, but a unique dynamic token is generated at the time of each transaction. This level of security is unprecedented and adds further layers of protection to the user. The dynamic token is never revealed to anyone, meaning it cannot be shared or coerced from the user, and there is no chance of it being stolen at any stage by over the shoulder copying or hackers.
Synapser’s mission is to provide a safe and trusted digital place in which to operate. The product can be integrated with all modern technology platforms and will appeal to all industry settings.
Mobile based system:
An authentication system which: is seamless, tiered, checks the mobile Device and application integrity. Offers second or multi-factor authentication and provides mutual authentication, and replaces storing your passwords. Also can be used as a software licence management engine.
An authorisation system which: is a standalone credential management system or can integrate with existing solutions such as LDAP (Lightweight Directory Access Protocol) or AD (Active Directory - Microsoft).
An access control system which: only allows access to approved systems or applications by users who have been given specific access and provides forensic logs.
Key features:
Multi-Factor Authentication (MFA) system for Network, Desktop and Web applications.
Mobile-based MFA for iOS or Android Apps with seamless switching between the two.
Login Authorisations requests from all Entry assigned applications.
Transactional Authorisations requests from all Entry assigned applications.
Facial recognition on Transactional Authorisations if additional security is required.
Device Authorisations on all new devices that applications are accessed from.
Geo-tagging of all data on creation – stored within the Secure VPC (Virtual Private Cloud).
Push notifications on all Login or Transaction Authorisation.
A fully configurable, tiered organisational hierarchy system for managing users credentials within Groups, Departments and Teams, only allowing access to approved systems or applications.
Instant blocking of accounts through administration management consol.
Bring Your Own Device (BYOD). A user can use Entry for Private and Work, and these environments are secure and separated from each other, ensuring no possibility of overlap.
Geo-ringfencing where users are restricted to login and transaction authorisations only from specific geographic areas due to the sensitive nature of their tasks.
Security Features:
No critical User Data stored on the Device, the digital DNA is used to ensure only authorised devices can work and if available bio-metrics on the Device is a further layer of security for the User. Ensuring that when a the device is stolen, nothing useful can be extracted.
Every single time the User opens the Entry App, Device Validation is executed to ensure the Device is valid on the system, that its DNA still matches, and that the Device hasn’t been blocked.
Entry does not make use of one time pins, which via SMS is subject to sim cloning, and via other communication forms are still subject to sight/shoulder-dropping and keylogging.
End to end secure communication between integrated application and Entry which uses a combination of SSL and our proprietary encryption to prevent eavesdropping over the internet networks.
All system Functions and Databases are isolated within a Secure VPC (Virtual Private Cloud) and are encrypted at rest. This means its impossible for our systems be accessed outside of our environment.
Geotagging and Geofencing of all data on creation and edit - stored in our Database within the Secure VPC.
Reviewed by Amazon Web Services
Synapser is proud to announce the successful AWS Foundational Technical Review (FTR) assessment for our flagship security application, Entry.
The review demands implementation of industry best practice related to security, reliability, and operational excellence.
“We are proud to receive this accreditation confirming that Entry has met with the AWS cloud architecture framework stringent requirements and regulations”.
Ross Joughin Sales and Marketing Director-Synapser
Entry Walkthrough
To gain a deeper understanding of how Entry has changed the digital landscape of mobile security, authentication and access to systems, view our “walk through” video.
Entry Add-ons
Plugin: Windows Custom Credential Provider
1&2: Microsoft's Active Directory is the most common credential management system used by companies worldwide, whether it be On-Prem or Remote Access. The issues remain the same; a username and password are required to authenticate. Unfortunately, most hacking-related breaches result from stolen or weak passwords and not from inadequate system security.
1.5&2.5: Entry WCCP - Windows Custom Credential Provider plugin enables companies to integrate Entry into their existing AD service. Dependant on the 'client', On-Prem (2.5*) or cloud (1.5*) infrastructure is installed, to receive login requests from devices (1*&2*) as well as passthrough authentication validation that can receive confirmation from Entry Secure Cloud infrastructure (4*) before granting access to users.
3: All access is controlled through the AWS Gateway, ensuring the system is highly secure and scalable to meet our customers' demands.
4: Entry's secure cloud infrastructure has all system functions and databases isolated within a Secure VPC (Virtual Private Cloud) which are encrypted at rest. This makes it impossible for our systems to be accessed outside of our environment and ensures the secure authentication of customers users.
5&6: Entry's corporate credential management features allow the system to be configured to either let users log in themselves or enable supervisors to log in should it be required.
7: Every login is geolocated and recorded in the systems forensic log. Companies can analyse any suspicious activities from locations that should not be on their network.