Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Proton Authenticator is a privacy-centric two-factor authentication application that creates time-based one-time passwords, enhancing the security of online accounts by providing an additional layer beyond mere passwords, thereby enabling users to safeguard their accounts across multiple devices. Being open-source and employing end-to-end encryption, it ensures that all cryptographic processes and secret keys are handled locally, so even the developers at Proton cannot access your unencrypted 2FA information, thus prioritizing transparency and robust privacy by design. Users have the ability to sync their 2FA codes across different devices through encrypted backups, including options like iCloud or a Proton Account, as well as import codes from other authenticator applications and export them if necessary, which offers flexibility and autonomy over their 2FA credentials without being tied to a single vendor. Moreover, Proton Authenticator is completely free, devoid of any ads or tracking, and incorporates secure functionalities such as biometric locks and offline access, allowing users to generate login codes whenever needed, even without an internet connection. This makes it an ideal choice for those who prioritize security while managing their online accounts effectively.
Description
Secure Cell serves as a versatile cryptographic container designed for the secure storage of various types of data, ranging from encrypted documents to database entries. It effectively encrypts data that is at rest and utilizes advanced encryption standards such as AES-256-GCM and AES-256-CTR. For encrypted communication, Secure Message offers a straightforward solution that caters to a broad spectrum of applications, enabling users to send encrypted and signed messages securely between individuals or from client to server, thus mitigating the risk of man-in-the-middle (MITM) attacks and preventing the leakage of singular secrets. It employs a combination of ECC with ECDSA and RSA integrated with PSS and PKCS#7 for robust security. Additionally, the Secure Comparator allows users to verify identities through a zero-knowledge proof protocol, facilitating secret comparisons over untrusted channels without exposing sensitive information or risking reuse attacks. Meanwhile, Secure Session provides an encrypted data exchange mechanism that is session-based and incorporates forward secrecy, enhancing security for more sophisticated infrastructures. By integrating these technologies, users can ensure a higher level of safety and confidentiality in their digital communications and data management.
API Access
Has API
API Access
Has API
Integrations
iCloud
Pricing Details
Free
Free Trial
Free Version
Pricing Details
$0.01
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Proton
Founded
2014
Country
Switzerland
Website
proton.me/authenticator
Vendor Details
Company Name
Cossack Labs
Founded
2014
Country
United Kingdom
Website
www.cossacklabs.com/themis/
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning