Whereas normal cloud-based file storage services use a less secure two-step verification system based on passwords and one time codes, SecSign Technologies new Portal controls user access with next-generation, two-factor mobile authentication and public key cryptography, without being SMS or mobile network based.
The software’s security portal makes it physically impossible for attackers to steal user credentials. No confidential credentials are ever entered, transmitted, or stored for the purposes of logins. Instead, SecSign ID uses mobile push authentication and public key infrastructure, which relies on the same fundamental security principles and the same combination of knowledge and possession that is used in smart card security.
This way, SecSign Technologies provides businesses with unhackable logins and a private storage vault immune to 99% of all hacking attempts – including phishing, malware, man-in-the-middle attacks, SQL injection, SIM card cloning, phone number porting, and the hacking of the master key from the token provider’s server. On top of this, all data and activity in the portal is protected by constant encryption and access is only given to authorized users.
“The level of protection offered far surpasses anything previously available – offering complete peace of mind for CTOs, with layers of security that go well beyond that which most other file storage and sharing services currently provide,”said Falk Goossens, Chief Executive Officer of SecSign Technologies.
The platform’s on-premise solution enables any enterprise to license the technology in order to house “White Label” to the SecSign Portal, as well as the SecSign ID on its own systems architecture and behind its own firewalls, without having to worry about the security of external, overseas storage solutions, to achieve maximum level of regulation and risk compliance.
“The SecSign Portal offers a completely confidential solution to enterprises, providing top-level security for user access and continuously encrypting all stored files, data, and messages,” added Goossens.