Corp Add:- 8th Floor, Unit 876
Aggarwal Cyber Plaza II,
Netaji Subhash Palace , Delhi -110034, India
0091-11-45272272/ 0091-11-47065866
E-mail: chetan.kapila@auth-shield.com
website: www.auth-shield.com
AuthShield security team has always been focused on innovating and creating the latest technology and so-
lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation,
Professionalism and dedication to meeting any target.
Apart from our research and development team in Two Factor Authentication, AuthShield security Team has
expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in
our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or
other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook.
Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi-
zation in the world in less than two hours!! With a multi-tenant architecture client has a centralized management
system to set up Two Factor Authentication for the entire user database. The users can easily be synced from
Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and
manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token
etc.
For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the
option of hosting the authentication server at their own premises with the same set of features.
Credentials
 Empanelled with DRDO Labs for multiple indigenous products.
 A strong Board of Advisors consisting of former Army officers and academicians.
 Only Indian company to have developed an indigenous Two Factor Authentication (Hard token,
USB Token, Image based login).
 Only Indian company to have developed and deployed an independent Internet Monitoring Sys-
tem across an entire region.
 Served key clients in Private and Public sector for more than four years.
 Management with combined experience of more than 5000 Hours in information security.
 Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor-
ing System, Multifactor Authentication.
Hard Token USB Token
Push Token
ARE YOU STILL USING THE
90’s TECHNOLOGY OR
HAVE MOVED ON
TO THE LATEST
ONE!
OTP-based authentication definitely adds
an extra step to your log-in process. How-
ever, depending on the form factor and the
vendor you chose it can be a minor incon-
venience or a major pain. Much also de-
pends on your user’s patience and your
willingness to spend the extra time to en-
sure a higher level of security. Users find
it difficult to enter OTP’s in devices.
In this scenario, AuthShield has launched
a revolutionary concept to use smart
phones as a medium for Two factor Au-
thentication. ‘One Touch Authentication’
bypass the standard One Time Passwords,
and brings a truly Two Factor Authentica-
tion experience which beats all hacking
mechanisms including ‘Key Logger’
The Problem
The Solution: AuthShield One Click TM
AuthShield One-Touch Authentication is the latest innovation
in Two factor Authentication. Once a user is registered for ‘One
Touch Authentication’ he receives a Push Notification on his
smart phone every time he attempts to log in. The user just has
to ‘Approve’ or ‘Deny’ the request by a Single ‘One Touch
Authentication’ on his device to log in or reject the attempt.
ADVANTAGES
One Click Authentication Architecture
Seamless integration with
 Financial transactions
 Web applications
 VPN
 Mail solutions
 Remote server
 Active Directory Login
 Cloud
 ERP solutions
Doesn’t slow you down while logging-in Doesn’t require any extra hardware tokens
Uses asymmetric cryptography to sign and verify communications
Delivered over a mutually-authenticated secure transport
An attacker can’t breach as it is based on Public-private key infrastructure
Different Token Types from AuthShield
Token Type
Description
It generates a new
password after fixed
intervals of time.
The user enters the
password generated
by the hard token as
a secondary form of
authentication.
Mobile token is
convenient form
factor installed on
the smart phone
itself . OTP is gener-
ated in the Smart
Phone itself
In SMS token
One Time Pass-
word is generat-
ed and sent to
the registered
mobile phone of
the user.
AuthShield soft
token is a con-
venient form
factor installed
on the laptop /
desktop itself.
The user enters
the password
generated by
soft token.
USB token is based
on Public Key Infra-
structure PKI Tech-
nology. It enables
the use of digital
signature, digital
receipt, encryption
and permissions
management ser-
vices.
Platforms
All OATH
Compliant
tokens
All Phones
With SMS
Offline Usage?
Requires Mobile
Operator
Connectivity
Operating Systems
Our Expertise in dealing with various Government Agencies
Simple and Easy Integration
Robust and Proven Technology
Competitive Advantage
Indigenous Technology
Unparalleled Support
AuthShield Advantages AuthShield Advantages

Auth-Shield

  • 1.
    Corp Add:- 8thFloor, Unit 876 Aggarwal Cyber Plaza II, Netaji Subhash Palace , Delhi -110034, India 0091-11-45272272/ 0091-11-47065866 E-mail: chetan.kapila@auth-shield.com website: www.auth-shield.com AuthShield security team has always been focused on innovating and creating the latest technology and so- lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi- zation in the world in less than two hours!! With a multi-tenant architecture client has a centralized management system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features. Credentials  Empanelled with DRDO Labs for multiple indigenous products.  A strong Board of Advisors consisting of former Army officers and academicians.  Only Indian company to have developed an indigenous Two Factor Authentication (Hard token, USB Token, Image based login).  Only Indian company to have developed and deployed an independent Internet Monitoring Sys- tem across an entire region.  Served key clients in Private and Public sector for more than four years.  Management with combined experience of more than 5000 Hours in information security.  Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor- ing System, Multifactor Authentication. Hard Token USB Token Push Token ARE YOU STILL USING THE 90’s TECHNOLOGY OR HAVE MOVED ON TO THE LATEST ONE!
  • 2.
    OTP-based authentication definitelyadds an extra step to your log-in process. How- ever, depending on the form factor and the vendor you chose it can be a minor incon- venience or a major pain. Much also de- pends on your user’s patience and your willingness to spend the extra time to en- sure a higher level of security. Users find it difficult to enter OTP’s in devices. In this scenario, AuthShield has launched a revolutionary concept to use smart phones as a medium for Two factor Au- thentication. ‘One Touch Authentication’ bypass the standard One Time Passwords, and brings a truly Two Factor Authentica- tion experience which beats all hacking mechanisms including ‘Key Logger’ The Problem The Solution: AuthShield One Click TM AuthShield One-Touch Authentication is the latest innovation in Two factor Authentication. Once a user is registered for ‘One Touch Authentication’ he receives a Push Notification on his smart phone every time he attempts to log in. The user just has to ‘Approve’ or ‘Deny’ the request by a Single ‘One Touch Authentication’ on his device to log in or reject the attempt. ADVANTAGES One Click Authentication Architecture Seamless integration with  Financial transactions  Web applications  VPN  Mail solutions  Remote server  Active Directory Login  Cloud  ERP solutions Doesn’t slow you down while logging-in Doesn’t require any extra hardware tokens Uses asymmetric cryptography to sign and verify communications Delivered over a mutually-authenticated secure transport An attacker can’t breach as it is based on Public-private key infrastructure Different Token Types from AuthShield Token Type Description It generates a new password after fixed intervals of time. The user enters the password generated by the hard token as a secondary form of authentication. Mobile token is convenient form factor installed on the smart phone itself . OTP is gener- ated in the Smart Phone itself In SMS token One Time Pass- word is generat- ed and sent to the registered mobile phone of the user. AuthShield soft token is a con- venient form factor installed on the laptop / desktop itself. The user enters the password generated by soft token. USB token is based on Public Key Infra- structure PKI Tech- nology. It enables the use of digital signature, digital receipt, encryption and permissions management ser- vices. Platforms All OATH Compliant tokens All Phones With SMS Offline Usage? Requires Mobile Operator Connectivity Operating Systems Our Expertise in dealing with various Government Agencies Simple and Easy Integration Robust and Proven Technology Competitive Advantage Indigenous Technology Unparalleled Support AuthShield Advantages AuthShield Advantages