Copyright © 2019 Transmit Security, all rights reserved. Privacy Policy

Enterprise Solutions

Transmit is helping the largest organizations in the world increase security, improve user experience, and reduce operational costs by getting rid of passwords and adopting zero trust concepts.

A combination of biometrics, mobile device security, and behavioral techniques continuously assess risk and build trust when users access various enterprise resources. Replacing binary access models (password/permissions) with adaptive models designed to detect and react to anomalies.

Increase Security

Convenient authentication using biometrics or the mobile device (even when offline). No need to remember passwords. Continuous risk and trust models to avoid the need to re-authenticate when accessing various enterprise and cloud resources. Keep a consistent user experience across various environments that may require different credentials today. Replace outdated physical tokens with mobile and FIDO2 alternatives.

Improve User Experience

Self-service capabilities to allow users to register, ask for access, and mitigate risks without the need to involve the contact center. Significantly reduce password reset and helpdesk costs. Avoid managing and supporting different authentication options for different environments.

Reduce Operational Costs

Replacing Passwords with Biometrics and

Device Security

Transmit offers a wide range of connectors to various types of systems, including Windows 7 and Windows 10 workstations, Mac desktops and laptops, web applications, VPN and VDI systems, cloud applications such as Office365, Salesforce.com, mobile applications and SSO systems. Once connected, the relevant system turns to Transmit for the authentication and authorization process instead of asking for a password.

IT and security administrators can use graphical tools to design the authentication and authorization process to each of the connected systems. The optimal behavior would be to push a notification to the user’s mobile device and have the user authenticate on the mobile device using biometrics such as fingerprint or face. Once completed, the user is automatically logged into the relevant system without the need for a password. To achieve that, Transmit provides an enterprise mobile app that users can download and register. The mobile app can be customized to the requirements of each organization, including logos, colors and full UX and UI journeys.

 

The mobile app authentication process is completely customizable through policy. The policy can include one or more of the following options:

  • Biometrics such as finger, face, or voice

  • Scanning a QR code presented by the system the user is trying to access

  • Generating an OTP code (soft token) on the mobile and copying it to the target system

  • Fallback knowledge-based options such as a PIN code or knowledge-based questions

In addition to the above policies, Transmit also supports authentication methods that do not require a mobile app, such as:

  • Leveraging biometric authentication on the Windows or Mac workstation such as face recognition or voice recognition

  • SMS OTP and email OTP

  • Hardware-based solutions such as Yubikey or Google Titan.

Biometrics, Behavioral, and FIDO

Transmit not only provides you with state-of-the-art biometric behavioral authenticators but also provides the many layers needed to properly manage the authentication experience, which varies from one user to another.

Call Center Authentication

Transmit can be leveraged during various call center identity-related journeys  such as account opening, authentication, authorization, and risk detection. The platform can be used to orchestrate

risk indicators and drive various decision and authentication processes.

Multi-Factor Authentication

Transmit supports multi-factor authentication (MFA) for both customers and employees. The platform includes a large set of built-in authenticators such as OTPs, soft tokens, biometric authenticators, and knowledge-based authenticators, and full FIDO support.

The Most Secure and Convenient Soft Token and TOTP

Transmit includes a set of built-in authenticators, one of which is an enterprise-grade soft token TOTP. The Transmit soft token is resilient to both man-in-the-middle and database breaching attacks and is uniquely positioned to address upcoming regulatory requirements.

Directory Services and Directory Aggregation

Transmit includes a built-in directory server that implements a wide range of Lightweight Directory Access Protocol and related standards, including full compliance with LDAPv3 but also support for Directory Service Markup Language (DSMLv2). 

Federation Services and SSO

Single sign-on (SSO) allows users to log into one application and then switch to other applications without the need to re-authenticate. The Transmit platform is designed to either act as an identity provider (IdP) or work with any standards-based IdP by easily accepting SAML or OpenID Connect tokens for SSO into SaaS and internal applications.

accecc_wf.png

Access Management+

If you’re looking to replace CA SiteMinder or any other legacy web access management platform, Transmit offers modern access management plus real-time risk controls and centralized identity logic management with our Journey Player.

Strong Device ID, Device Risk and Device Management

Being able to identity the user’s device and leverage its security capabilities leads to increased security overall and, very often, an improved user experience. Device ID and device risk technologies can be orchestrated with other authentication and risk detection techniques to determine the right level of access for each session.

Continuous Risk and Orchestration

Whenever the user tries to access a protected resource such as a desktop or a web application, the Continuous Risk and Orchestration engine is invoked. The engine looks at many factors to determine risk and trust, including:

  • Is the user already authenticated and how strong was the authentication process?

  • How trusted is the user’s endpoint device? Any anomalies on the device?

  • Is the access attempt normal for this user? Any anomalies in the user’s behavior?

  • Any previous anomalies associated with this user account?

  • What’s the sensitivity level of the resource?

Based on the above the engine can grant access, require a stronger authentication process, or delegate the decision to a security analyst or a manager. The risk and orchestration models continuously learn and update the user’s profile with each user activity.