Transmit Security makes it simple by connecting your applications to authenticators like face recognition, eye recognition, voice recognition, fingerprint and OTP. You will be able to do trusted device binding, primary authentication, secondary authentication and respond to security risks immediately. Deploy any policy instantly. No change to your application required!
Identity & Access Security
Transmit provides a full set of authentication services to manage primary login, multi-factor, and step-up authentication across various applications and channels. The platform includes a large set of built-in authenticators such as OTPs, soft tokens, biometric authenticators, and knowledge-based authenticators. In addition, the platform can be used to manage any third-party authenticator or authentication service connected to the Identity Services Hub. Transmit’s authentication services manage the enrollment process for each authenticator and also tasks such as de-enrollment, re-enrollment, and expiry periods. The platform provides flexible ways of defining authentication levels and attaching them to different authenticators and journeys. The platform allows building rules for authenticat
Risk Management
Device risk algorithms look at various aspects of the device, such as device type, version, age, location, and usage patterns to determine the trust and risk level in the device. Devices with a lower trust level or a greater risk level can be restricted in the type of services they’re allowed to access or may require a stronger or different authentication process. The device’s risk score can be orchestrated with other risk scores such as user behavior to fine tune access decisions.
Web Security
Web Device ID technologies identify users returning from the same browser instance. This technology can be used to increase trust in the login process or to step up authentication if the user is coming from an unrecognized browser instance. Web device ID technologies use various techniques to store information on the user’s device and to read configuration from the device to determine the identity of the device. A stronger form of web device identification uses certificates that are stored on the device and used by the browser to establish a secure and authenticated channel between the browser and the application server.