Recognition by TechNavio
Alongside previous recognitions by Gartner, Frost & Sullivan and Emerce, ID Control has been recognized by TechNavio in the global hardware one-time password token authentication market 2012-2016 report.
TechNavio is a global technology research and advisory company that has a strong focus on trends in technology. By using qualitative and quantitative tools in the research methodologies, TechNavio can identify and explain trends, forecasts and analyse markets and identify new and existing opportunities in the global markets.
In the latest report, TechNavio’s researchers forecast that the global hardware OTP authentication token market will grow at a compounding annual growth rate of 9.12 percent in the period of 2012-2016. A growing dependency on websites and web applications for transactions are one of the many factors that contribute to this growth.
ID Control offers two types of hardware OTP tokens, the ID Control keychain OTP Key and CardID. Other methods of authentication of ID Control are soft-tokens (HandyID, MailID and MessageID), PKI USB Token and biometric authentication solutions, such as KeystrokeID and RiskID.
The Hague, 20 August 2012
ID Control, specialist in strong authentication and One Time Passwords (OTP) has been added to the Frost & Sullivan analyses of the worldwide OTP market as a market contender.
ID Control differentiates itself from the market by offering one platform with a wide range of authentication and OTP solutions and enabling their customers to choose which solution suits their personal requirements.
The platform consists of hard- and software solutions such as:
Hardware: USB Token based OTP with PKI, OTP hardware keys, credit card sized OTP keys.
Software: SMS OTP (MessageID), OTP mobile app (HandyID),
ID Control gives its customers the option to send OTPs via an encrypted email message through its MailID product. Before entering the internet bank, a MaillD PDF with an OTP inside which is PIN protected is sent to the user’s email address This avoids the cost associated with hardware and SMS OTP’s
Attractive pricing. By offering their products either in an on-premise model or a monthly / yearly subscription model ID Control is able to serve every company or organisation a solution for their security needs no matter what the budget is.
ID Control has a strong focus in the financial vertical but also develops their solutions to be user-friendly for all vertical types.
The Hague, 26 February 2010
ID Control, the specialist in strong and easy authentication and encryption has integrated its’ solutions with Securepoint, the Unified Threat Management solution which protects the gate to your network resources or your remote office from a mixture of risks and threats. Sensitive information from your network or application can now be securely exchanged with Securepoint’s VPN access to the right persons, who are really who they proclaim to be.
ID Control empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token. Next to One Time Password authentication the user’s legal binding digital signature on a USB token can be used to sign-on to the access of Securepoint’s VPN. ID Control’s solutions are affordable and very user-friendly and available for Securepoint’s VPN but also for web based email and other services such as web application, network and remote desktop access.
Securepoint, www.securepoint.de, founded in 1997, is the fastest growing Unified Threat Management (UTM) solution in Europe and develops and markets innovative IT-Security Technology for the total protection of an organization’s network. Securepoint UTM-security solutions (Unified Threat Management) with Firewall, IDS, VPN, Virus protection, web content/spam filtering and high availability features meet all of the security demands and wishes of today’s IT security manager. Securepoint excels in the easy web based configuration and administration of the system for all security modules. Securepoint is available as Appliance, or Software which can be installed on any computer or server, or VMWare image. All Securepoint solutions are distributed over a network of 2.000 partners securing already more than 40.000 networks worldwide. Customers range from small businesses, lawyers and doctors, to large industries and ministries.
ID Control finalist in Computing Security Awards in the category Biometrics!
10 September 2010, Leading two- and three-factor authentication vendor ID Control has been selected by the readers of the Network Computing and Computing Security magazines as a finalist in the category Biometrics for the Computing Security Awards. The only awards which recognises the products and services with excellence in IT Security that have made a positive contribution to making organizations more secure.
The Computing Security Awards were launched by Network Computing and Computing Security to honour the products and services that have made a positive contribution to making organisations more secure. ID Control has been nominated and selected as a finalist due to numbers of votes for the category; Biometrics Solution of the Year 2010 Award.
ID Control, the Hague, Netherlands-based specialist in online identity and access management, has integrated its authentication and encryption solutions with Exact Synergy, a browser-based solution of Delft, Netherlands-based Exact Software that works in conjunction with traditional ERP applications.
ID Control “empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token. Next to One Time Password authentication the user's typing behaviour can be recognized during log-in and even the legal binding digital signature can be used to sign-on to a transaction or access,” according to the company statement.
The company calls unauthorized access “probably the most significant vulnerability to your business-critical Exact Synergy environment,” and promises that with ID Control in place, “confidentiality, integrity, and proof of origin of any communication within the online Exact environment can be ensured.”