Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
CENTAGATE CLOUD provides a unified login solution that safeguards all applications from potential security threats through FIDO2 passwordless authentication. By centralizing access, it ensures that users can control, protect, and secure their application entry with just one set of login credentials. This robust system effectively mitigates risks such as phishing, fraud, and password theft, as only a single login credential is required across all applications. Moreover, it is highly economical, featuring zero capital expenditures and minimal operational costs. Key attributes that enhance the security of authentications with CENTAGATE CLOUD include a multi-factor authentication process that verifies identity through a combination of what users possess (their devices), their inherent characteristics (biometrics), and what they remember (passwords). Additionally, it leverages previous login behaviors to assess risks, which can prevent potential security breaches. The solution comes equipped with a pre-integrated, certified Securemetric FIDO2 server that streamlines both registration and authentication processes, ensuring a seamless and secure user experience. Ultimately, CENTAGATE CLOUD not only simplifies user access but also fortifies digital security against evolving threats.
Description
A two-factor authentication system transforms any USB drive into a security token for your computer, enabling secure access to Windows. It also supports RFID, OTP, and U2F tokens by substituting the traditional Windows login password. This innovation eliminates the vulnerabilities associated with weak password-based logins by utilizing a hardware security key, which can be a USB flash drive, Google Authenticator OTP, FIDO U2F, or industrial RFID access cards. Although the computer remains password-protected, users no longer need to manually input their passwords upon logging in, unlocking, or authorizing changes. Rohos adheres to NIST-approved data security protocols and employs encryption, ensuring that the password is not stored on the authentication device in a readable format. Additionally, the USB key comes with copy protection to prevent unauthorized duplication, and all information on the key is safeguarded with AES-256 bit encryption. This robust approach not only enhances security but also streamlines user experience, making it easier to manage access without compromising safety.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$2 per month
Free Trial
Free Version
Pricing Details
$32 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Centagate Cloud
Founded
2019
Country
Malaysia
Website
centagatecloud.com
Vendor Details
Company Name
Tesline-Service
Website
www.rohos.com
Product Features
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection