Consulting

Two factor authentication is useful beyond simple login applications for remote access services. We offer our knowledge to extend your capabilities to successfully implement 2FA.
A number of specialized use cases are ideal for using air gapped, counter based OTP tokens:
  • Protection of sensitive data records like VIP data in customer care systems
  • Key Management System use cases
  • High assurance / high availability systems that rely on cloned cards (cards with the same secret key)
  • Quorum decisions when handling change or deletion of critical data records
  • Pseudonymous voting systems like closed user group voting tied to memberships
Benefit from our comprehensive experience in designing and implementing large-scale enterprise and public-facing applications with strict security requirements (PCIDSS, ISO27001).