SlideShare a Scribd company logo
1 of 5
Download to read offline
The only
authentication
platform you’ll
COVER
ever need.
The power of knowing is an incredibly
powerful thing. Knowing that you can access
your data whenever, wherever and however
you want. Knowing that when you do, you’re
supremely secure. Knowing that your solution
will be shaped according to your needs.
Knowing it’s a platform that uses leading
patented technology across web, voice and
SMS. Knowing that it’s already earned the
trust of millions all over the world.

That’s the power of knowing.
Swivel.
Trusted by major global enterprises, Swivel is a proven,
flexible authentication platform that’s helping millions of
users work more efficiently, and enhancing IT security.
At Swivel we don’t take a ‘one size fits all’ approach. Instead we
have a choice of authentication solutions that can be tailored
around your business needs and your budget. Whatever you need
to securely connect to and whatever communication devices you
want to use, we can make it happen, securely and seamlessly.

Applications of Swivel.
Applications.
The key to Swivel is the variety and flexibility available with our products – i.e. we can
meet all your authentication requirements. We can deliver a constant user experience
for a wide range of applications including VPN-based, web-based or applicationbased. Our solutions can be software-only, as a physical appliance, or as a Virtual
Machine Appliance, depending on your requirements.

VPN.

Core.

Web

Cloud

Desktop

Applications

The core of our offering is a set of technologies that delivers our challenge-responsebased tokenless authentication solutions. These technologies allow us to deliver a
consistent and compelling user experience.
At the heart of every Swivel solution is our authentication platform. It’s the policy engine
that defines and maintains all user rules. It manages user accounts and provides a range
of administration and operational tools, to ensure that the policies you decide are right
for your organisation are indeed implemented. It’s a scalable, resilient enterprise-grade
authentication platform.

Desktop.

VPNs provide secure
remote access. This
access requires
immensely strong
authentication. They can
be configured to use the
Swivel platform as an
external RADIUS server
for authentication. The
Swivel platform can pass
additional information
back in RADIUS
responses, to tailor the
VPN integration.

The Swivel platform
has been deployed to
allow tokenless access
to web sites and web
applications on various
levels; be it allowing
secure enterprise to
enterprise comms.
(e.g. via Outlook Web
Access or via an
Extranet), or between
an enterprise and its
customers or partners,
via a customer portal
or e-commerce site.

As cloud computing
continues to expand and
revolutionise business,
the need to consider
security around cloud
applications is evermore
paramount. We’ve
developed a range of
cloud options, including
integration with Office
365, Salesforce.com and
Google Docs, ensuring
peace of mind when it
comes to secure access
to cloud services.

Remote users have
secure and rapid
access to services and
applications. Such
an environment
provides remote access
to users with strong
authentication. Equally it
can be deployed to local
desktop environments,
ensuring strong
authentication whenever
corporate data is
accessed, either locally
or remotely.

Web.

SMS.

Telephony.

As a leading technology
business, we must
ensure our products are
accessible via the latest
devices. It’s equally
important that our clients
can confidently access
their unified networks
remotely and securely.
We have developed a
secure mobile app that
allows safe delivery of
our security strings to
mobile devices.

Since Swivel began,
we’ve been innovators in
image-based, tokenless
authentication via web
browsers – all designed
to protect web pages,
Outlook Web Access
(OWA) and SSL VPNs.
We have three such
products: all of which
enable the security string
challenge to seamlessly
integrate with web and
VPN login pages.

We naturally have
an SMS product for
those users without
smartphones. The
option of the PINsafe
protocol makes SMS
a stronger and more
flexible proposition. Our
SMS solution is entirely
flexible. Security strings
can be sent in a a range
of ways. You have the
choice of a large number
of SMS providers to
choose from.

Swivel can be used
as a voice channel to
authenticate internet
use. This operates in
the same way as the
standard OTC process.
Either a challenge is
delivered to the user’s
phone, with a response
then being entered on
the web page; or the
challenge is delivered
onscreen, with the
response being entered
on the phone.

Core

Device options.

This platform can be combined with our patented PINsafe technology to deliver a unique
and powerful authentication solution.
Our core can work with or without our PINsafe technology; always ensuring security
regardless of the level of complexity required. Aside from the instant provision/
deprovision of users (by just adding or removing end users from Active Directory
groups), there are obvious cost benefits associated, as physical tokens (and the
associated administration) are completely removed. With this in mind, the overall
costs of implementing an authentication solution are drastically reduced – as well
as on-going management.

Cloud.

Mobile App.

VPN

Web.

Devices

Mobile App

Web

SMS

Telephony

Devices.
When we talk about ‘devices’ we’re really referring to the interface options available
for our users to manage the authentication process. Swivel can work with a wide range
of devices including mobile apps, tablets, in fact, pretty much any device with a webbrowsing option. Or, if your preference is even more basic than that, we have the easier
option of SMS.
As you would expect, we are constantly evolving our device options so that, as user
behaviour changes, our authentication platform can be used simply, efficiently and
above all securely.
PINsafe.

Strong or two-factor? It’s your choice.

Questions answered.

A key, and unique feature, of our authentication platform is our patented technology
PINsafe. PINsafe combines the use of registered PINs with random 10 digit strings that are
sent to you either by SMS, Mobile app, email, telephone, or web, either on demand or in
advance. You then combine these in your head to work out your unique one-time access
codes, putting you at the heart of the strong multi-factor authentication process.

Our approach is all about getting the right balance of security, cost and usability.
Not all situations have the same degree of risk or threat to the security of critical data.
That’s why we offer a wide range of user interface options to reflect the potential risk,
individual users’ access privileges and compliance responsibilities.

Integration.

Licence terms.

The beauty of PINsafe is that users need to enter a different credential every time, whilst
never entering their PIN.

A secure investment with solid ROI.

Swivel can be easily integrated with all of
the usual market leading VPNs and other
remote access solutions - from Vendors
including Juniper, Citrix, Cisco, Microsoft,
Checkpoint, Sonicwall, Netgear, to mention
a few. It can also integrate with J2EE, .Net
and LAMP-based web applications.

Swivel is licenced on a per-user basis.
Perpetual and SaaS prices are available.
Swivel can also be purchased as a software
application or on a purpose-built appliance.
Appliances can be physical of virtual and
are available in a range of high-availability
configurations.

Your PIN is
in your head.

With secure, remote access to your systems, your staff can work wherever, whenever.
This increased productivity will create a genuine return on investment. Our approach utilises
existing IT and mobile phone investments, so the costs are limited to the server licences and
minimal mobile network charges. Because of this, our solutions are easily scalable and can
support 100,000+ users without the need to purchase special hardware or client software.

Equally, Swivel can be synchronised with
your existing user repositories, such as
Active Directory (no schema changes
required) or SQL-based database, to
create/delete user accounts.

Trusted by millions around the world.
The core sends
y
 ou a 10-digit
number here.

You combine
them in your head to
create your 4 digit
One Time Code.

Established in 2000 and a member of the worldwide Marr Group of companies, Swivel is a
tried, tested and most importantly trusted authentication platform. We have a proven track
record and our authentication solutions are used day-in, day-out by over a million users and
some of the biggest names in the world of business. Our products have been independently
tested and are CCTM accredited. Swivel is used across all verticals in the private sector as well
as widely in the public sector, throughout the world. Installations go from 10 users to 100,000
users and beyond.

Resellers.
We have distributor and reseller partners all over the world.

How it works.
PINsafe allows challenge response authentication, without the need of a traditional token.
The different user devices can be assigned to different users depending on your corporate
security and access policies. It is designed with ultimate flexibility in mind – regardless of the
size of your organisation.

The benefits of our tokenless solutions are endless.

For more details, please visit swivelsecure.com/partners

Assisting with compliance.
Where two-factor authentication is
required, such as PCI and CoCo Compliance,
Swivel can help deliver a compliant system.
Swivel is a CCTM accredited two-factor
authentication solution.

Technical information.
Software-only requirements: Requires Java
1.6/Apache-Tomcat Version 6. Min 1G RAM,
1GHz processor.
Physical appliance: 1U Appliance.
(subject to change)

Height: 1.68” (4.27 cm),
Width: 17.60” (44.70 cm),
Depth: 21.50” (54.61 cm).
RAID disks.
VM Appliance.

Mobile platforms and SMS providers.
There are versions of the client available for
all current smartphone platforms including
iOS (Apple), Android, Blackberry, Windows
Mobile and J2ME.
Swivel can also integrate with over 40
different SMS aggregators/suppliers and
more can and are being added all the time.
What authentication interfaces
are supported?
Swivel supports RADIUS-based
authentication, SAML-based authentication
and ADFS-based authentication for cloud
applications and there is also a proprietary
XML-based API available.
Management costs.
Swivel is designed to keep management
costs low, by offering the following features.
	 •  range of user self-help (account reset,
A
PIN changes).
	 • An easy to use helpdesk screens.  
	 • Single-click PIN reset, account unlock.
	 •  utomatic processes for account creation,
A
account deletion, account reset.

Distributed in OVF format. Compatible with
ESX v3.x-4, Hyper V and Citrix Xen App.
Interfaces.
Authentication.
RADIUS.
Supports PAP, CHAP, MSCHAP v2, EAP-MD5
and LEAP protocols.
Supports RADIUS Challenge-Response and
RADIUS Change PIN.
Supports Vendor Specific Attributes.
Agent-XML.
Agent-XML (XML-based API over http(s)).
ADFS/SAML v2 via additional support
software.
Operational.
LDAP (for synchronisation with user
repositories).
Supports LDAP, LDAPS and Global
Catalogue.
Logging.
Supports XML-based and Syslog-based
logging.
Reporting.
In-built and customised reports in CSV and
XML formats on-demand or scheduled.
Management.
Web-based admin/helpdesk console.
Email alerts for system alarms.
T: +44 (0) 1937 582020 E: hq@swivelsecure.com
Swivel Secure Ltd, Equinox 1, Audby Lane, Wetherby LS22 7RD

swivelsecure.com

More Related Content

What's hot

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE AWS Chicago
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
C&W Product Portfolio
C&W Product PortfolioC&W Product Portfolio
C&W Product PortfolioCWBusiness
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 

What's hot (20)

Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
C&W Product Portfolio
C&W Product PortfolioC&W Product Portfolio
C&W Product Portfolio
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 

Similar to The only authentication platform you’ll ever need.

How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
CloudWare Technologies
CloudWare TechnologiesCloudWare Technologies
CloudWare TechnologiesDavid Oyerinde
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonCloudFenceTechnologi
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonCloudFenceTechnologi
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Steven Williams
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
 

Similar to The only authentication platform you’ll ever need. (20)

How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
CloudWare Technologies
CloudWare TechnologiesCloudWare Technologies
CloudWare Technologies
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in Gurgaon
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
AWS Partners
AWS PartnersAWS Partners
AWS Partners
 
Microsoft Office 365
Microsoft Office 365 Microsoft Office 365
Microsoft Office 365
 
Google Workspace Services
Google Workspace ServicesGoogle Workspace Services
Google Workspace Services
 
Azure Partners
Azure PartnersAzure Partners
Azure Partners
 
GCP Partner
GCP PartnerGCP Partner
GCP Partner
 
Microsoft Partner
Microsoft PartnerMicrosoft Partner
Microsoft Partner
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in Gurgaon
 
Google Workspace Partner
Google Workspace PartnerGoogle Workspace Partner
Google Workspace Partner
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
 

More from Icomm Technologies

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks Icomm Technologies
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost StuctureIcomm Technologies
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Icomm Technologies
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in TelecommutingIcomm Technologies
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it Icomm Technologies
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deckIcomm Technologies
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 

More from Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 

Recently uploaded

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Recently uploaded (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 

The only authentication platform you’ll ever need.

  • 2. The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs. Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world. That’s the power of knowing.
  • 3. Swivel. Trusted by major global enterprises, Swivel is a proven, flexible authentication platform that’s helping millions of users work more efficiently, and enhancing IT security. At Swivel we don’t take a ‘one size fits all’ approach. Instead we have a choice of authentication solutions that can be tailored around your business needs and your budget. Whatever you need to securely connect to and whatever communication devices you want to use, we can make it happen, securely and seamlessly. Applications of Swivel. Applications. The key to Swivel is the variety and flexibility available with our products – i.e. we can meet all your authentication requirements. We can deliver a constant user experience for a wide range of applications including VPN-based, web-based or applicationbased. Our solutions can be software-only, as a physical appliance, or as a Virtual Machine Appliance, depending on your requirements. VPN. Core. Web Cloud Desktop Applications The core of our offering is a set of technologies that delivers our challenge-responsebased tokenless authentication solutions. These technologies allow us to deliver a consistent and compelling user experience. At the heart of every Swivel solution is our authentication platform. It’s the policy engine that defines and maintains all user rules. It manages user accounts and provides a range of administration and operational tools, to ensure that the policies you decide are right for your organisation are indeed implemented. It’s a scalable, resilient enterprise-grade authentication platform. Desktop. VPNs provide secure remote access. This access requires immensely strong authentication. They can be configured to use the Swivel platform as an external RADIUS server for authentication. The Swivel platform can pass additional information back in RADIUS responses, to tailor the VPN integration. The Swivel platform has been deployed to allow tokenless access to web sites and web applications on various levels; be it allowing secure enterprise to enterprise comms. (e.g. via Outlook Web Access or via an Extranet), or between an enterprise and its customers or partners, via a customer portal or e-commerce site. As cloud computing continues to expand and revolutionise business, the need to consider security around cloud applications is evermore paramount. We’ve developed a range of cloud options, including integration with Office 365, Salesforce.com and Google Docs, ensuring peace of mind when it comes to secure access to cloud services. Remote users have secure and rapid access to services and applications. Such an environment provides remote access to users with strong authentication. Equally it can be deployed to local desktop environments, ensuring strong authentication whenever corporate data is accessed, either locally or remotely. Web. SMS. Telephony. As a leading technology business, we must ensure our products are accessible via the latest devices. It’s equally important that our clients can confidently access their unified networks remotely and securely. We have developed a secure mobile app that allows safe delivery of our security strings to mobile devices. Since Swivel began, we’ve been innovators in image-based, tokenless authentication via web browsers – all designed to protect web pages, Outlook Web Access (OWA) and SSL VPNs. We have three such products: all of which enable the security string challenge to seamlessly integrate with web and VPN login pages. We naturally have an SMS product for those users without smartphones. The option of the PINsafe protocol makes SMS a stronger and more flexible proposition. Our SMS solution is entirely flexible. Security strings can be sent in a a range of ways. You have the choice of a large number of SMS providers to choose from. Swivel can be used as a voice channel to authenticate internet use. This operates in the same way as the standard OTC process. Either a challenge is delivered to the user’s phone, with a response then being entered on the web page; or the challenge is delivered onscreen, with the response being entered on the phone. Core Device options. This platform can be combined with our patented PINsafe technology to deliver a unique and powerful authentication solution. Our core can work with or without our PINsafe technology; always ensuring security regardless of the level of complexity required. Aside from the instant provision/ deprovision of users (by just adding or removing end users from Active Directory groups), there are obvious cost benefits associated, as physical tokens (and the associated administration) are completely removed. With this in mind, the overall costs of implementing an authentication solution are drastically reduced – as well as on-going management. Cloud. Mobile App. VPN Web. Devices Mobile App Web SMS Telephony Devices. When we talk about ‘devices’ we’re really referring to the interface options available for our users to manage the authentication process. Swivel can work with a wide range of devices including mobile apps, tablets, in fact, pretty much any device with a webbrowsing option. Or, if your preference is even more basic than that, we have the easier option of SMS. As you would expect, we are constantly evolving our device options so that, as user behaviour changes, our authentication platform can be used simply, efficiently and above all securely.
  • 4. PINsafe. Strong or two-factor? It’s your choice. Questions answered. A key, and unique feature, of our authentication platform is our patented technology PINsafe. PINsafe combines the use of registered PINs with random 10 digit strings that are sent to you either by SMS, Mobile app, email, telephone, or web, either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Our approach is all about getting the right balance of security, cost and usability. Not all situations have the same degree of risk or threat to the security of critical data. That’s why we offer a wide range of user interface options to reflect the potential risk, individual users’ access privileges and compliance responsibilities. Integration. Licence terms. The beauty of PINsafe is that users need to enter a different credential every time, whilst never entering their PIN. A secure investment with solid ROI. Swivel can be easily integrated with all of the usual market leading VPNs and other remote access solutions - from Vendors including Juniper, Citrix, Cisco, Microsoft, Checkpoint, Sonicwall, Netgear, to mention a few. It can also integrate with J2EE, .Net and LAMP-based web applications. Swivel is licenced on a per-user basis. Perpetual and SaaS prices are available. Swivel can also be purchased as a software application or on a purpose-built appliance. Appliances can be physical of virtual and are available in a range of high-availability configurations. Your PIN is in your head. With secure, remote access to your systems, your staff can work wherever, whenever. This increased productivity will create a genuine return on investment. Our approach utilises existing IT and mobile phone investments, so the costs are limited to the server licences and minimal mobile network charges. Because of this, our solutions are easily scalable and can support 100,000+ users without the need to purchase special hardware or client software. Equally, Swivel can be synchronised with your existing user repositories, such as Active Directory (no schema changes required) or SQL-based database, to create/delete user accounts. Trusted by millions around the world. The core sends y ou a 10-digit number here. You combine them in your head to create your 4 digit One Time Code. Established in 2000 and a member of the worldwide Marr Group of companies, Swivel is a tried, tested and most importantly trusted authentication platform. We have a proven track record and our authentication solutions are used day-in, day-out by over a million users and some of the biggest names in the world of business. Our products have been independently tested and are CCTM accredited. Swivel is used across all verticals in the private sector as well as widely in the public sector, throughout the world. Installations go from 10 users to 100,000 users and beyond. Resellers. We have distributor and reseller partners all over the world. How it works. PINsafe allows challenge response authentication, without the need of a traditional token. The different user devices can be assigned to different users depending on your corporate security and access policies. It is designed with ultimate flexibility in mind – regardless of the size of your organisation. The benefits of our tokenless solutions are endless. For more details, please visit swivelsecure.com/partners Assisting with compliance. Where two-factor authentication is required, such as PCI and CoCo Compliance, Swivel can help deliver a compliant system. Swivel is a CCTM accredited two-factor authentication solution. Technical information. Software-only requirements: Requires Java 1.6/Apache-Tomcat Version 6. Min 1G RAM, 1GHz processor. Physical appliance: 1U Appliance. (subject to change) Height: 1.68” (4.27 cm), Width: 17.60” (44.70 cm), Depth: 21.50” (54.61 cm). RAID disks. VM Appliance. Mobile platforms and SMS providers. There are versions of the client available for all current smartphone platforms including iOS (Apple), Android, Blackberry, Windows Mobile and J2ME. Swivel can also integrate with over 40 different SMS aggregators/suppliers and more can and are being added all the time. What authentication interfaces are supported? Swivel supports RADIUS-based authentication, SAML-based authentication and ADFS-based authentication for cloud applications and there is also a proprietary XML-based API available. Management costs. Swivel is designed to keep management costs low, by offering the following features. • range of user self-help (account reset, A PIN changes). • An easy to use helpdesk screens. • Single-click PIN reset, account unlock. • utomatic processes for account creation, A account deletion, account reset. Distributed in OVF format. Compatible with ESX v3.x-4, Hyper V and Citrix Xen App. Interfaces. Authentication. RADIUS. Supports PAP, CHAP, MSCHAP v2, EAP-MD5 and LEAP protocols. Supports RADIUS Challenge-Response and RADIUS Change PIN. Supports Vendor Specific Attributes. Agent-XML. Agent-XML (XML-based API over http(s)). ADFS/SAML v2 via additional support software. Operational. LDAP (for synchronisation with user repositories). Supports LDAP, LDAPS and Global Catalogue. Logging. Supports XML-based and Syslog-based logging. Reporting. In-built and customised reports in CSV and XML formats on-demand or scheduled. Management. Web-based admin/helpdesk console. Email alerts for system alarms.
  • 5. T: +44 (0) 1937 582020 E: hq@swivelsecure.com Swivel Secure Ltd, Equinox 1, Audby Lane, Wetherby LS22 7RD swivelsecure.com