We help implement hardware authentication devices such as Smart Cards and FIDO2 tokens. We use hybrid cards that have a contact and a contact-less chip. The contact-less chip stores your physical access control system credentials securely (doors, elevators, etc). The contact side of the card is used to login to your computer network, line of business applications, vpn and much more. This system is secure, password-free and uses minimal (or no) middle ware.
We work with your existing physical access control system, if the system is using the same old standard keys that exist all over the world, we help roll them to your own unique set of encryption keys. If the card readers are vulnerable to hacking we help to upgrade to a more secure solution. We can work with several of the leading vendors in physical access control systems.
If your system uses proprietary credentials, let's talk we can work to avoid a migration.
We can help your business increase your cyber-security stance by eliminating the password and moving you to a hardware based authentication solution. Let us audit your existing PKI and make sure it is secure, or build a new one that uses best-practices. We can even help move your business to FIDO2 authentication and store the credentials on the same card your staff use to access your facilities. FIDO2 does not require a public key infrastructure (PKI), and still is a secure and password-free solution.
Hardware Security Modules (HSM) provide a secure way to protect private keys that surpass software key protection in terms of security. Each HSM solution is chosen based on the use case with budgetary constraints in mind. HSMs vary greatly in cost, but with our expertise you can be assured that the HSM solution reflects your budget and your business's needs. HSM use can encrypt database, protect your certificate infrastructure, and protect your firewall decryption certificates.
Once you are using a hardware authentication device, we can help get all passwords out of your computing environment altogether. We do this by harnessing the power of Kerberos, SSH keys, and much more. We even can make sure smart phones have a password-free solution to authenticate to your business resources.
Combine your building physical access credentials with your business logical access credentials on the same card. This could be your first step towards real cyber security.