• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg

Press

Latest Press

ID Control listed in Frost & Sullivan

 

fs-logo1

 

Press release: :2012-08-26 15:27:30 Source: Frost & Sullivan

ID Control, specialist in strong authentication and One Time Passwords (OTP) has been added to the Frost & Sullivan analyses of the worldwide OTP market as a market contender.

 ID Control differentiates itself from the market by offering one platform with a wide range of authentication and OTP solutions and enabling their customers to choose which solution suits their personal requirements.

 The platform consists of hard- and software solutions such as:
Hardware:
USB Token based OTP with PKI, OTP hardware keys, credit card sized OTP keys.
Software: SMS OTP (MessageID), OTP mobile app (HandyID),
ID Control gives its customers the option to send OTPs via an encrypted email message through its MailID product. Before entering the internet bank, a MaillD PDF with an OTP inside which is PIN protected is sent to the user’s email address This avoids the cost associated with hardware and SMS OTP’s

 Attractive pricing. By offering their products either in an on-premise model or a monthly / yearly subscription model ID Control is able to serve every company or organisation a solution for their security needs no matter what the budget is.

ID Control has a strong focus in the financial vertical but also develops their solutions to be user-friendly for all vertical types.

 

Interview Rabobank, with ID Control’s CEO. Hans Kortekaas.

Interview Rabobank, with ID Control’s CEO. Hans Kortekaas. brings with HandyID, MessageID, KeystrokeID, RiskID, ID Control USB Token and OTP Key highly secure, easy and advanced strong authentication tokens with a fully integrated central authentication management server solution to the market. ID Control offers a diversity of security products and services in order to provide your business with secure and authorized extranet (intranet, internet) access, secure transactions and payments, secure access, identification, authorisation, strong authentication and digital signing.

 

ID Control Endpoint Security in WinMagPro Security Top 10

ID Control Endpoint Security is listed in the Security Top 10 of WinMag Pro and provides a service for online antivirus, keylogging and spywarevoorziet per month and per server or workstation for organziations of any size. This fully online managed security service offers better protection for your servers, desktops and laptops while preventing virus-, spyware-, keylogger-, malware- en spam-infections. Organizations can make use of 3 online security subscriptions ranging from 1,30 to 1,65 Euros per station, per months with Antivirus, Antirootkit en Antispyware Management and even subscriptions for Anti-spam Management and Surf Protection.

WinMag Pro

 

ID Control nominated finalist as Biometrics Solution of the year 2010

ID Control finalist in Computing Security Awards in the category Biometrics!


10 September 2010
, Leading two- and three-factor authentication vendor ID Control has been selected by the readers of the Network Computing and Computing Security magazines as a finalist in the category Biometrics for the Computing Security Awards. The only awards which recognises the products and services with excellence in IT Security that have made a positive contribution to making organizations more secure.

The Computing Security Awards were launched by Network Computing and Computing Security to honour the products and services that have made a positive contribution to making organisations more secure. ID Control has been nominated and selected as a finalist due to numbers of votes for the category; Biometrics Solution of the Year 2010 Award.

 

USB Stick Guards Your Portable ID, Data, Passwords and Applications

The beauty of the ID Control USB Token device is its simplicity and portability; plug it into any computer USB port, and it runs. With the ID Control USB Token come many portability and security features than any other flash drive, such as strong authentication, secure storage, application virtualization, online passwords and favorites management.

Strong authentication is enabled through the on-board password generator which issues a new one-time password (OTP) every time a user remotely and securely wants to log into the protected remote access of networks, applications and digital resources. At the same time the user’s credentials such as a digital certificate can be verified for strong authentication or used for digital signing purposes. The USB Token is PIN-protected and puts certificates, account and passwords, applications and other data on the move in a secure vault, since data is fully encrypted. Applications can be run virtually from the flash memory of the token which makes it a very small and secure multifunctional portable computing device. Onboard multiple online favorites with related accounts and passwords can be memorized so that with only one master password the user can log in to multiple websites and applications.

Yearly over 20,000,000 unsecured USB sticks are lost in businesses, and with 62% of employees leaving sticks plugged in to unattended computers*, businesses are extremely vulnerable to data and identity theft and fraud. With the ID Control USB Token the related security risks and threats are minimized at affordable costs and users even adopt the token fast due to its user friendly interesting features.

Read more: USB Stick Guards Your Portable ID, Data, Passwords and Applications
 

Keep the hackers and malware outside with unified threat management and ID Control

The Hague, 26 February 2010, ID Control, the specialist in strong and easy authentication and encryption has integrated its’ solutions with Securepoint, the Unified Threat Management solution which protects the gate to your network resources or your remote office from a mixture of risks and threats. Sensitive information from your network or application can now be securely exchanged with Securepoint’s VPN access to the right persons, who are really who they proclaim to be.

A lot of organizations that offer remote working facilities to their clients, subsidiaries, branche offices, suppliers or employees enable private tunnels to internal network resources or applications through VPN. Securepoint manages the network related security threats and risks in a blended easy protective approach and provides the VPN from one centrally managed secure point at the gate. Together with ID Control users need to authenticate themselves when accessing the VPN, which was before with only a user name and password, which is a relatively weak authentication mechanism. ID Control empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token.  Next to One Time Password authentication the user’s legal binding digital signature on a USB token can be used to sign-on to the access of  Securepoint’s VPN.  ID Control’s solutions are affordable and very user-friendly and available for Securepoint’s VPN but also for web based email and other services such as web application, network and remote desktop access.

Read more: Keep the hackers and malware outside with unified threat management and ID Control

 

ID Control adds login protection to Exact Synergy

MessageID with Exact Synergy ID Control, the Hague, Netherlands-based specialist in online identity and access management, has integrated its authentication and encryption solutions with Exact Synergy, a browser-based solution of Delft, Netherlands-based Exact Software that works in conjunction with traditional ERP applications.


ID Control notes that “sensitive information can now be securely exchanged to the right persons, who are really who they proclaim to be, such as with access to annual profit and loss and income statements, electronic invoices from enterprises and annual statements from accountants and sensitive customer data.”

ID Control “empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token. Next to One Time Password authentication the user's typing behaviour can be recognized during log-in and even the legal binding digital signature can be used to sign-on to a transaction or access,” according to the company statement.

The company calls unauthorized access “probably the most significant vulnerability to your business-critical Exact Synergy environment,” and promises that with ID Control in place, “confidentiality, integrity, and proof of origin of any communication within the online Exact environment can be ensured.”

 

ID Control introduces MailID for Secure E-Mailing

MailIDID Control brings highly secure, easy and advanced authentication, authorisation and access management solutions to the market. ID Control offers a diversity of security products and services in order to provide businesses with secure and authorized extranet (intranet, internet) access, secure transactions and payments, secure access, identification, authorisation, strong authentication and digital signing. ID Control will differentiate itself from its competitors (generally larger firms) through a relatively low cost of ownership with a high security level while remaining user-friendly. At the same time it develops unique product market combinations, that will serve as unique selling competitive advantages.

ID Control has revealed recently the launch of MailID, the worlds most easy and secure e-mail signing-, encryption- and decryption software to enforce compliance demands and to guarantee that confidential data is delivered securely through e-mail. MailID's software license is free of charge and documents can be exchanged securely with signed and completely sealed and secured e-mail. MailID guarantees the digital integrity, confidentiality and signature of the e-mail and its message contents. Sensitive information can now be securely exchanged and sealed via e-mail, such as with banking statements and loan offers from banks, electronic invoices from enterprises and annual statement from accountants, recipes from doctors and pharmacies and files from lawyers.

Read more: ID Control introduces MailID for Secure E-Mailing
 

Online Identity Assurance closes door on unwanted visitor

Most organizations that operate online offer clients, partners, suppliers or employees access to private or sensitive online services and information or let them perform transactions. Controlling the identity and access of users to systems, networks and applications are ranked high in priority on the list of security measures. Strong authentication is based on the principle of "something you know (password/PIN)" and "something you have (authentication token)," or "something you are (biometrics)" and is therefore more secure than only username and password.

With a secure and affordable indentity assurance service, the organization decides on the strong authentication needs, demands and wishes to be managed while paying only on a monthly basis for the usage of the service. With online identity assurance from ID Control, no implementation and maintenance of an authentication infrastructure is required, by making use of the already existing and pluggable infrastructure and expertise of ID Control's broad partner network.

All hardware, security, infrastructure and software components and services needed for implementing and maintaining the authentication management environment are taken care of. This means ID Control Server software, Web-based management interface, ID Control authentication tokens like HandyID, MessageID, KeystrokeID and ID Control OTP Key, and the maintenance and support by an external highly qualified engineer are included or optional.
 
  •  Start 
  •  Prev 
  •  Next 
  •  End 

Page 1 of 2

What's your e-authentication method?

User-name and Password - 56.7%
Keyfob - 0%
Smart Card with Reader - 0%
USB Token - 20%
Biometrics - 3.3%
Soft Token - 3.3%
PKI - 6.7%
A combination - 10%

Total votes: 30
The voting for this poll has ended on: 24 Jun 2013 - 00:00