• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5

Latest Press

Press release: 07/03/2014 10:27


ID Control is listed in the TechNavio report as a prominent player in the Multi Factor Authentication market for 2014-2018.

Multi-factor authentication is a technique for enhancing security systems with the help of two or more forms of authentication that are not related to each other. It is used to develop an extra layer of protection against unauthorized access. A multi-factor authentication system mainly uses credentials such as passwords, pins, mobile phones, security tokens, smart cards, and biometrics for authentication. A multi-factor authentication system relies on the following factors: "something the user knows", "something the user has", and "something the user is". These factors must be authenticated by the user in a multi-factor authentication process.

Technavio forecasts The Global Multifactor Authentication market to grow at a CAGR of 19.1 percent for the period 2012–2016 and 19.31 percent over the period 2013-2018.

Next to that, TechNavio's analysts forecast the Multifactor Authentication market in South Korea and Japan to grow at a CAGR of 31.4 and 31.3 percent in South Korea and Japan respectively over the period 2013-2018. One of the key factors contributing to this market’s growth is increased incidences of security attacks in Government departments. The Multifactor Authentication market in South Korea and Japan has also been witnessing increased collaboration between the IT security vendors of these two countries. However, the high implementation costs of multifactor authentication solutions could pose a challenge to the growth of this market.

This report covers the present scenario and the growth prospects of the Global Multi-factor Authentication market for the period 2014-2018. The report covers the different forms of multi-factor authentication solutions, i.e., two-factor authentication and three-factor authentication. To calculate the market size, it considers revenue generated from OTP hardware tokens, smart card-based authentication, and phone-based authentication. The report also presents the vendor landscape and a corresponding detailed analysis of the top four vendors in the Global Multi-factor Authentication market. However, it does not include those companies that provide only services and do not have their own product. In addition, the report discusses the major drivers that influence the growth of the market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends emerging in the market.


Press Release 10/07/2014 14:52

ID Control is listed in the TechNavio report as a prominent player in the OTP authentication market.
Hardware OTP authentication is a two-factor authentication solution that enables secure remote network access and digital signature functionality with the help of a physical hardware authenticator or a secure token. Hardware OTP utilizes a separate device or a security token issued to a user to generate a password that acts as a second factor for authentication. There are different types of tokens such as OTP tokens, USB tokens, SIM tokens, and mini tokens. These are required for added security in critical infrastructures and in companies that witness a high level of online activity. Since hardware OTP tokens provide a second layer of secure authentication, it becomes difficult for attackers to hack into a user's system. Even in cases of identity theft, attackers will not be able to cause any harm unless they have access to the secure hardware token.

TechNavio's analysts forecast the Global Hardware One-Time Password Token Authentication market to grow at a CAGR of 9.12 percent over the period 2012-2016 and 9.96 percent during the period 2014-2018. The Global Hardware One-Time Password Token Authentication market has also been witnessing the emergence of a unified platform for various authentication solutions.

This report covers the present scenario and the growth prospects of the Global Hardware OTP Token Authentication market for the period 2014-2018. To calculate the market size, the report considers revenue generated from sales of hardware OTP tokens. It also presents the vendor landscape and a corresponding detailed analysis of the top four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Global Hardware OTP Token Authentication market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market.

News Release:

The man who is suspected of earning a quarter million Euros through scamming via Marktplaats has to show up in front of the judge today. The 28 years old Remy D. would be the leader of the group of nearly 40 frauds. This crew of fraudsters behind EBay's Dutch Subsidiary Marktplaats frauds appears in front of judge.

Hans Kortekaas, CEO of ID Control, the company specialized in identity control on the internet was interviewed on Business News Radio. According to him, the suspects placed normal ads just like anyone else. "Subsequently, the buyers tried to buy the products, however, they never received the products. The payment method was most likely through bank wire payments.
Hence, they have never received the products, even though they paid for it."

Kortekaas doesn't believe that Ebay's Marktplaats is eminently a party that is facing major security issues.

"Of course Marktplaats is a company that provides numerous ads. Thus, they will catch more wind in the area of fraud."


To listen to the full conversation in Dutch please visit the website of BNR






Press release: :2012-08-26 15:27:30 Source: Frost & Sullivan

ID Control, specialist in strong authentication and One Time Passwords (OTP) has been added to the Frost & Sullivan analyses of the worldwide OTP market as a market contender.

 ID Control differentiates itself from the market by offering one platform with a wide range of authentication and OTP solutions and enabling their customers to choose which solution suits their personal requirements.

 The platform consists of hard- and software solutions such as:
USB Token based OTP with PKI, OTP hardware keys, credit card sized OTP keys.
Software: SMS OTP (MessageID), OTP mobile app (HandyID),
ID Control gives its customers the option to send OTPs via an encrypted email message through its MailID product. Before entering the internet bank, a MaillD PDF with an OTP inside which is PIN protected is sent to the user’s email address This avoids the cost associated with hardware and SMS OTP’s

 Attractive pricing. By offering their products either in an on-premise model or a monthly / yearly subscription model ID Control is able to serve every company or organisation a solution for their security needs no matter what the budget is.

ID Control has a strong focus in the financial vertical but also develops their solutions to be user-friendly for all vertical types.

Interview Rabobank, with ID Control’s CEO. Hans Kortekaas. brings with HandyID, MessageID, KeystrokeID, RiskID, ID Control USB Token and OTP Key highly secure, easy and advanced strong authentication tokens with a fully integrated central authentication management server solution to the market. ID Control offers a diversity of security products and services in order to provide your business with secure and authorized extranet (intranet, internet) access, secure transactions and payments, secure access, identification, authorisation, strong authentication and digital signing.

ID Control Endpoint Security is listed in the Security Top 10 of WinMag Pro and provides a service for online antivirus, keylogging and spywarevoorziet per month and per server or workstation for organziations of any size. This fully online managed security service offers better protection for your servers, desktops and laptops while preventing virus-, spyware-, keylogger-, malware- en spam-infections. Organizations can make use of 3 online security subscriptions ranging from 1,30 to 1,65 Euros per station, per months with Antivirus, Antirootkit en Antispyware Management and even subscriptions for Anti-spam Management and Surf Protection.

WinMag Pro

ID Control finalist in Computing Security Awards in the category Biometrics!

10 September 2010
, Leading two- and three-factor authentication vendor ID Control has been selected by the readers of the Network Computing and Computing Security magazines as a finalist in the category Biometrics for the Computing Security Awards. The only awards which recognises the products and services with excellence in IT Security that have made a positive contribution to making organizations more secure.

The Computing Security Awards were launched by Network Computing and Computing Security to honour the products and services that have made a positive contribution to making organisations more secure. ID Control has been nominated and selected as a finalist due to numbers of votes for the category; Biometrics Solution of the Year 2010 Award.

The beauty of the ID Control USB Token device is its simplicity and portability; plug it into any computer USB port, and it runs. With the ID Control USB Token come many portability and security features than any other flash drive, such as strong authentication, secure storage, application virtualization, online passwords and favorites management.

Strong authentication is enabled through the on-board password generator which issues a new one-time password (OTP) every time a user remotely and securely wants to log into the protected remote access of networks, applications and digital resources. At the same time the user’s credentials such as a digital certificate can be verified for strong authentication or used for digital signing purposes. The USB Token is PIN-protected and puts certificates, account and passwords, applications and other data on the move in a secure vault, since data is fully encrypted. Applications can be run virtually from the flash memory of the token which makes it a very small and secure multifunctional portable computing device. Onboard multiple online favorites with related accounts and passwords can be memorized so that with only one master password the user can log in to multiple websites and applications.

Yearly over 20,000,000 unsecured USB sticks are lost in businesses, and with 62% of employees leaving sticks plugged in to unattended computers*, businesses are extremely vulnerable to data and identity theft and fraud. With the ID Control USB Token the related security risks and threats are minimized at affordable costs and users even adopt the token fast due to its user friendly interesting features.

The Hague, 26 February 2010, ID Control, the specialist in strong and easy authentication and encryption has integrated its’ solutions with Securepoint, the Unified Threat Management solution which protects the gate to your network resources or your remote office from a mixture of risks and threats. Sensitive information from your network or application can now be securely exchanged with Securepoint’s VPN access to the right persons, who are really who they proclaim to be.

A lot of organizations that offer remote working facilities to their clients, subsidiaries, branche offices, suppliers or employees enable private tunnels to internal network resources or applications through VPN. Securepoint manages the network related security threats and risks in a blended easy protective approach and provides the VPN from one centrally managed secure point at the gate. Together with ID Control users need to authenticate themselves when accessing the VPN, which was before with only a user name and password, which is a relatively weak authentication mechanism. ID Control empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token.  Next to One Time Password authentication the user’s legal binding digital signature on a USB token can be used to sign-on to the access of  Securepoint’s VPN.  ID Control’s solutions are affordable and very user-friendly and available for Securepoint’s VPN but also for web based email and other services such as web application, network and remote desktop access.

What's your e-authentication method?

Go to top