For small-scale solutions, simple setups and quick integrations. The SecSign ID Cloud provides you with security in one simple step. This default infrastructure runs in a replicated AWS (Amazon Web Services) environment. Simply download your plugin, install it with your service and you’re ready to go. Your users can use the secure multi-factor authentication after creating their own SecSign ID – or you can define one for them. It’s as simple as security gets.
For bigger setups, extensive options for user management, user support and the security to have all your data on your premise. The on-premise setup allows for customizations to fit your requirements, including but not limited to custom authentication rules, app access protection, custom 2FA app to fit your company design and more.
This option can also be used without any external network access. You will receive the SecSign ID Server Software, which can be installed in an environment of your choice: for example a datacenter or your own on-premise server.
The perfect solution for setups that require both: Customizations, extensive user management and support without managing your own server. We set up your customized SecSign ID server in a datacenter of your choice and take care of server management, updates and support, and you get to enjoy the advantages of an on-premise server.
Deployment in the Cloud |
Managing your data on-premise |
All inclusive managed cloud |
|
---|---|---|---|
Setup | Setup and integration with just a few clicks – have your users secured before lunch. | Setup is simple and you don’t need advanced coding skills | We take care of the setup and server management for you – no need to deal with server details. |
Usability | Easy to use and no frills where you don’t need them | Easy to use and customizable down to the details | Easy to use and customizable down to the details |
Wide range of authentication methods: 2FA with or without password protection, biometric access, login with visual 2FA (access pass) or text | |||
Apps for iOS, Android, Windows and OSX | |||
Allow users to use multiple devices for 2FA | |||
Customer support with our developer experts – our support works closely with our product developers for quick and comprehensive solutions. | |||
Users can self-manage in cases of lost and new devices
– and – |
|||
You can individually manage and assist users | |||
Use the convenient custom app for iOS, Android, MacOS or Windows Desktop
– or – |
|||
we build you a custom ID app in your corporate design or integrate the 2FA in an existing company app | |||
Conveniently manage your users via the administrative panel | |||
Use the extensive user management options like user profile management, endpoint monitoring, individual and selective rules for authentication, devices and more. | |||
Maintain control over everything, from data to update frequencies, authentication procedure or administration. | |||
Use the SecSign ID Server as a complete IdM solution for managing and securing your users | |||
Connect your existing user management system (for example AD) with the SecSig ID Server for convenient rollout customized for your requirements | |||
Use existing import and enrollment procedures for seamless onboarding of your users. | |||
Keep all data within your infrastructure, behind your firewall | |||
Authentication can be completely independent from external networks, no internet access required | |||
Pricing | Free for most plugins | Contact us for pricing information | Contact us for pricing information |
Your users can take care of their account without flooding the help desk with unnecessary requests. No matter if they lost their phone, need to set up a new device or want to use the ID on several devices. They can access their device list in the app and manage devices and logins. With the backup code the users can manage their account without administrative help – conveniently and secure!
With the on-premise and managed cloud setups you can manage every detail of the user management and authentication process via the administrative panel. From comprehensive endpoint management, custom and selectively applicable rules as well as device security. Block authentication requests from outdated OS, specific locations or specific IPs. You can create different workflows for specific users, user groups, or applications in just a few simple step – manage risk profiles and resource vulnerability.
Link your user management system and manage all users and all aspects of user management and security with one IdM. More information about the SecSign ID IdM
Want to learn more about SecSign’s innovative and highly secure
solutions for protecting your user accounts and sensitive data?
Use our contact form to submit your information, and a SecSign sales representative will contact you within one business day.
If you need assistance with an existing SecSign account or product
installation, please see the FAQs for more information on the most common questions. You don’t find the solution to your problem? Don’t hesitate to contact the
Product Support
I am Interested in