i-Sprint’s AccessMatrix™ Universal Authentication Server (UAS)

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)i-Sprint Innovations Pte Ltd
Websitehttps://www.i-sprint.com/
Company size (employees)100 to 499
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

UAS offers the freedom for organizations to deploy various authentication methods from different vendors under one platform and manage it as a holistic security approach.

The use of the Pluggable Authentication Module (PAM) approach also allows organizations to have ease of adding new methods when available on top of their existing scheme. Security services APIs are available for application integration, and it shield the complexity of token integration. End-to-end encryption is used during authentication session; protection of data in transit.

By deploying i-Sprint UAS, the key benefits for an organization include the reduce of operational cost with a common authentication platform, simplify integration and deployment efforts, ability to handle complex authentication requirements, able to cater for future authentication options, and it provides a highly scalable, open and reliable platform.

Brief Overview

AccessMatrix™ Universal Authentication Server (UAS) is a versatile authentication server which enables organizations to unify their different authentication mechanisms and simplify integration complexities. Using a Pluggable Authentication Module (PAM) approach, UAS enable ease of adding new authentication mechanisms based on evolving needs. Supported authentication methods includes password, out-of-band, biometrics, PKI, knowledge-based, certificate, contextual, OTP (hard/ soft) and external authentication integration, etc.

UAS provides a Complete Token Life Cycle Management & Administration that include issuance, delivery, out of sync, lost token, temporary access, replacement over time and other supporting functions such as PIN mailer integration, reporting module, etc. It provides out-of-the-box embedded authentication support for tokens from various vendors like OneSpan (Vasco), i-Sprint YESsafe Token, Thales, RSA, ActivIdentity and OATH based vendors and biometric devices from CrossMatch, Futronic, NEC, etc. It also offers a choice of mobile token integration to meet different needs: OneSpan DIGIPASS for mobile, i-Sprint YESsafe OATH-based token and Google Authenticator. It has built-in static ID/password authentication module supports very flexible password quality policy, password expiry policy and login policy.

The solution also includes adaptive authentication, also known as risk-based authentication, that challenge if additional factors are required by analysing context and behaviour to determine the risk associated with each login attempt. Additional factor may not be skipped when trust is high. Context and behaviour being considered may include:
• Where is the user logging in from?
• Is the user using the same device as prior?

These considerations help determine whether additional authentication factor is required. Likewise, access to sensitive data may be prompt with additional factors during login.