I-SPRINT INNOVATION PTE LTD
Established in 2000 in Singapore, i-Sprint is a global IAM (Identity & Access Management) Security and Mobile App Protection software company that helps organizations manage user identity life cycle, enforce strong authentication via multi-factor authentication, control fine-grained access, secure online transactions, and protect mobile apps against malware and external attacks.
With a mission to enable individuals, organizations, and societies to build trust and identity assurance for powering productivity gain through its AccessMatrix IAM suite and YESsafe Mobile App Security suite, i-Sprint has been recognized as a trusted partner by many organizations.
This trust is evident in its successful deployments in more than 250 global organizations with complex operations, regulated financial services institutions, security-sensitive government agencies, etc. Through its innovative products and proven track records, i-Sprint has established a direct presence and active authorized partners across Singapore, China, Hong Kong, Japan, Malaysia, Taiwan, Thailand, Cambodia, Vietnam, and the United
(SizeLimitingPyMap: {booth=4F25, company_name=I-SPRINT INNOVATION PTE LTD, content=Established in 2000 in Singapore, i-Sprint is a global IAM (Identity & Access Management) Security and Mobile App Protection software company that helps organizations manage user identity life cycle, enforce strong authentication via multi-factor authentication, control fine-grained access, secure online transactions, and protect mobile apps against malware and external attacks.
With a mission to enable individuals, organizations, and societies to build trust and identity assurance for powering productivity gain through its AccessMatrix IAM suite and YESsafe Mobile App Security suite, i-Sprint has been recognized as a trusted partner by many organizations.
This trust is evident in its successful deployments in more than 250 global organizations with complex operations, regulated financial services institutions, security-sensitive government agencies, etc. Through its innovative products and proven track records, i-Sprint has established a direct presence and active authorized partners across Singapore, China, Hong Kong, Japan, Malaysia, Taiwan, Thailand, Cambodia, Vietnam, and the United, country=Singapore, exhibition_category=Exhibitor, facebook=https://www.facebook.com/iSprintInnov, hs_createdate=1730463156605, hs_lastmodifieddate=1731569156592, hs_object_id=19188233987, hs_object_source=INTEGRATION, hs_object_source_detail_1=OEM Integration, hs_object_source_id=1940923, hs_object_source_label=INTEGRATION, hs_pipeline=102713672, hs_pipeline_stage=186575225, hs_updated_by_user_id=68932678, hs_was_imported=true, id=19188233987, individual_page_type=[Exhibitor], linkedin=https://www.linkedin.com/company/i-sprint-innovations/, logo_image_url=https://24345494.fs1.hubspotusercontent-na1.net/hubfs/24345494/SFF%202023/Sponsor-Exhibitor/company%20logo20241029_114444-3.png, product_and_service=[Cybersecurity, Quantum Computing], product_and_service_v2=[Cybersecurity, Quantum_Computing], product_and_services_oem_data=Cybersecurity; Quantum Computing, product_name_1=AccessMatrix™ Universal Access Management (UAM), product_name_2=AccessMatrix™ Universal Authentication Server (UAS), product_name_3=AppProtect+, product_name_4=AccessMatrix™ Unified Single Sign-On (SSO), product_shortcut_1=AccessMatrix™ Universal Access Management (UAM) is a robust solution that integrates web single sign-on (SSO), web access management, federated SSO, externalized authorization management, and hierarchy-based delegated administration. Built on AccessMatrix™ technology, UAM delivers comprehensive application security through secure Administration, Authentication, Authorization, and Audit services (4As) tailored for business applications in regulated sectors like banking and finance. This enables custom enterprise and internet applications to leverage a unified set of Identity & Access Management (IAM) services, significantly reducing integration costs.
UAM’s WSA Reverse Proxy secures both web and non-web applications by enforcing access control policies for resources on web and application servers. As a no-code integration solution, it ensures seamless and transparent SSO session lifecycle management for user applications. In addition to reverse proxy capabilities, UAM enhances web access protection with built-in mechanisms for improved performance and scalability.
This policy-driven approach simplifies user administration and application integration. Built on the AccessMatrix framework, UAM inherits its key features while adding its own unique capabilities.
The UAM security infrastructure is designed to protect multi-tier applications—both web-based and non-web-based—across heterogenous platforms. The AccessMatrix hierarchical model allows organizations to implement a unified security infrastructure, facilitating easy integration with multiple applications. All access control decisions are managed by the AccessMatrix security server, ensuring high scalability, software reusability, and reduced application maintenance efforts.
With i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAM effectively addresses the administration needs of multi-region and departmental applications, corporate banking systems, Managed Security Providers, and SaaS Providers.
Key features of UAM include:
- Support for Identity Brokering, Federated SSO, Web SSO, and Enterprise SSO, with embedded strong authentication.
- Extensible Pluggable Authentication Modules that meet strong authentication requirements using FIDO2, QR code, E2EE, certificate-based, hardware, software tokens, and SMS.
- Flexible and open APIs for customization, integration, and code reuse for 4As services.
- Compatibility with SAML, OAuth 2.1, and OpenID Connect.
- Tamper-evident audit trails and scalability.
Key benefits of UAM include:
- Simplified integration and deployment with native support for Microsoft Entra ID, LDAP, AD, and JDBC directories—eliminating the need for schema changes or external user store modifications.
- A highly scalable, open, and reliable platform that meets demanding operational requirements, including automatic failover, horizontal and vertical scaling, and 24/7 operations.
- Comprehensive security management and enforcement of 4As, including authentication policies, methods, user stores, administration delegation, and audit compliance reporting.
- Reduced integration and operational costs through a common set of IAM services for custom enterprise and internet applications., product_shortcut_2=AccessMatrix™ Universal Authentication Server (UAS) is a versatile authentication solution that enables organizations to unify their diverse authentication mechanisms while simplifying integration complexities.
Incorporating i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAS allows organizations to assign security administrators at various levels. This framework can be extended to enable external organizations to manage IDs and user rights through their own security administrators, making it particularly well-suited for Management Security Providers and SaaS Providers.
Key Features:
Versatile Authentication Support: UAS employs a Pluggable Authentication Module (PAM) approach, allowing for easy integration of new authentication methods as they evolve. It supports a wide array of authentication techniques, including passwords, out-of-band methods, biometrics, PKI, knowledge-based authentication, certificates, contextual factors, OTP (both hard and soft), and external authentication integrations.
Comprehensive Token Lifecycle Management: UAS offers complete management of the token lifecycle, including issuance, delivery, handling out-of-sync and lost tokens, temporary access, and replacements. It also features supporting functions such as PIN mailer integration and a robust reporting module.
Embedded Authentication Support: UAS provides out-of-the-box support for tokens from various vendors, including OneSpan (Vasco), i-Sprint YESsafe Token, RSA, and OATH-based vendors. It also offers mobile token integration options, such as Vasco DIGIPASS for mobile, i-Sprint YESsafe OATH-based tokens, and Google Authenticator. Its built-in static ID/password authentication module supports flexible password quality, expiry, and login policies.
Secure Cloud Integration: UAS facilitates secure authentication integration with cloud services using industry standards like SAML and OAuth. Organizations can create authentication workflows that chain multiple methods (e.g., Active Directory authentication combined with DIGIPASS token) to meet specific security requirements. The dynamic authentication flow allows for real-time adjustments based on user group, source IP address, and other contextual factors.
Native Integration with External User Stores: UAS supports integration with various user registries, including LDAP and Active Directory, via LDAP or JDBC (Java Database Connectivity). This allows organizations to connect the Security Server with existing user registries without the need for synchronization.
Optional Key Protection: UAS offers key protection using Hardware Security Modules (HSM). Its out-of-the-box integration with leading HSM vendors provides advanced security features utilizing FIPS (Federal Information Processing Standard)-certified hardware for cryptographic keys.
Comprehensive SDKs: UAS includes extensive SDKs with REST, Java, and .NET APIs, facilitating easy integration with various applications.
Key Benefits:
By deploying i-Sprint UAS, organizations can achieve reduced operational costs through a unified authentication platform, simplified integration and deployment efforts, the capability to address complex authentication requirements, adaptability for future authentication options, and a highly scalable, open, and reliable solution., product_shortcut_3=AppProtect+ is a cutting-edge solution that proactively safeguards mobile applications against a wide range of risks and attacks, ensuring secure operation even on heavily infected devices. With its robust callback APIs, AppProtect+ meets user demands by efficiently collecting and transmitting risk data to the server. The upcoming version of AppProtect+ will enhance this capability by actively collecting mobile threat intelligence, further mitigating risks and improving overall security posture.
Unlike traditional antivirus software, AppProtect+ offers protection without the need for virus database updates or internet connectivity. In comparison to hardened app solutions, it effectively prevents passive attacks such as reverse engineering, repackaging, and source code modification. Additionally, AppProtect+ can respond dynamically to real-time threats detected during app execution.
Runtime App Self-Protection (RASP)
Isolation and Proactive Scanning: AppProtect+ isolates applications from their runtime environment, enabling proactive scanning and protection against malicious attacks. This ensures that apps can operate securely, even on rooted or jailbroken devices. For instance, it mitigates risks from screen readers on Android and prevents data theft, such as login credential capture via untrusted third-party keyboards.
Risk Detection Without Internet Connection: A key differentiator of AppProtect+ is its ability to detect risks without requiring an internet connection, unlike traditional virus database matching mechanisms. This capability eliminates potential risks associated with desynchronized databases.
Active Threat Intelligence Collection: The upcoming version of AppProtect+ will include features for actively collecting mobile threat intelligence. This enhancement will allow the solution to analyze emerging threats in real-time, enabling proactive measures to be taken against potential vulnerabilities and attacks.
Four Key Functions:
Anti-Reverse Engineering & Anti-Tampering: AppProtect+ protects APK files from reverse engineering, debugging, and cache attacks using tools like APK Tool, dex2jar, and JEB. Its unique authentication technology halts APK execution if any tampering is detected.
Anti-Debugger: The solution employs white-box encryption technology to prevent code injection, blocking various forms of tampering, including hook attacks, accessibility exploits, phishing, transaction hijacking, and data modification.
Anti-Stealing Measures: AppProtect+ supports data encryption, verifies keyboard trustworthiness, and blocks screenshots. It also implements memory data protection to prevent the capture, hijacking, or tampering of both dynamic and static app data.
Server-Side Client Management: With its callback functionality, AppProtect+ allows users to call server APIs to collect threat and device data. These data can then be used to establish policies for managing client accounts and controlling device access., product_shortcut_4=AccessMatrix™ Unified Single Sign-On (SSO) Platform is a comprehensive solution that integrates Enterprise Single Sign-On (ESSO), Federated Single Sign-On, Web Single Sign-On, and Mobile Single Sign-On. This Identity Federation platform supports popular identity protocols such as SAML and OAuth, enabling seamless SSO capabilities for cloud and mobile applications. With AccessMatrix™, employees, consumers, customers, and partners can access corporate and cloud applications through a single login process across various operating platforms, including mobile devices. The integration of ESSO, Federated SSO, Web SSO, and Mobile SSO allows for a unified SSO experience across a diverse range of web, non-web, and cloud-based applications in a single deployment.
AccessMatrix™ ESSO facilitates sign-on for any application, enabling single sign-on for Windows® desktop, web, Java™, Flash®, AJAX, custom-built applications, and terminal emulators for Unix, AS400, and mainframe systems without requiring code changes. This is achieved through the installation of an ESSO client agent on the user’s desktop. ESSO also features an optional web interface for launching and signing into target applications, a self-service portal for application enrollment, password recovery, and Windows Active Directory password resets. Additionally, it includes a cryptographically secured offline cache that can be stored on desktops or portable secure storage devices, allowing for offline access. Passwords are automatically synchronized back to the server when connectivity is restored.
AccessMatrix™ Federated SSO serves as a federated authentication gateway, enabling internal corporate users to log in with their existing corporate directory accounts and seamlessly access cloud applications (SaaS) such as Salesforce, WebEx, and Google Apps. It supports various federation standards, including SAML and OAuth, and can function as both an Identity Provider and Service Provider, storing user identities in AccessMatrix™’s internal and external directories.
AccessMatrix™ Web SSO and Mobile SSO Integration provide a unified web-based USO Identity Gateway, allowing organizations to transition from Enterprise SSO to Federated and Web SSO. By alleviating the burden of managing multiple usernames and passwords, USO enhances user experience, reduces support costs, strengthens security, and ensures compliance. In addition to Windows desktops, USO supports SSO capabilities on virtual remote desktops (Citrix, VMware) and mobile devices (Android and iOS). With web security agents for leading web and application servers, Web SSO enables URL-level access control and transparently pushes user information via standard HTTP request headers to assist web applications in establishing user identities. It also supports the mapping of different user IDs across applications to create a unique SSO ID, facilitating co-existence strategies during migration to the AccessMatrix™ Web SSO system.
FIDO2 Integration enhances the security of the AccessMatrix™ platform by enabling passwordless authentication. This standard allows users to authenticate using biometric data or hardware tokens, significantly reducing the risk of phishing attacks and credential theft. By incorporating FIDO2, AccessMatrix™ not only strengthens security but also improves user convenience, as users can log in without the need to remember complex passwords.
Key Benefits:
• A unified platform encompassing Enterprise SSO, Federated SSO, Web SSO, and Mobile SSO, enhancing user convenience and productivity.
• Strengthened security through flexible authentication methods, including FIDO2, maximizing ROI by reducing helpdesk costs.
• Unified SSO access to cloud, web, and desktop applications, enabling rapid deployment and ensuring compliance with robust reporting capabilities.
In summary, AccessMatrix™ Unified SSO Platform stands out for its comprehensive security features, seamless integration capabilities, and user-friendly experience. By addressing the challenges of password management and enhancing security through FIDO2, AccessMatrix™ empowers organizations to streamline access to their applications while maintaining the highest standards of cybersecurity., record_type=[Exhibitor], sff_path=isprint, sff_sponsor_and_exhibitor_name=I-SPRINT INNOVATION PTE LTD, sort_type=I, status=Active, twitter=https://twitter.com/iSprintInnov, unique_reference_number=EX10225, website=https://www.i-sprint.com/, zone=NA})
AccessMatrix™ Universal Access Management (UAM)
AccessMatrix™ Universal Access Management (UAM) is a robust solution that integrates web single sign-on (SSO), web access management, federated SSO, externalized authorization management, and hierarchy-based delegated administration. Built on AccessMatrix™ technology, UAM delivers comprehensive application security through secure Administration, Authentication, Authorization, and Audit services (4As) tailored for business applications in regulated sectors like banking and finance. This enables custom enterprise and internet applications to leverage a unified set of Identity & Access Management (IAM) services, significantly reducing integration costs.
UAM’s WSA Reverse Proxy secures both web and non-web applications by enforcing access control policies for resources on web and application servers. As a no-code integration solution, it ensures seamless and transparent SSO session lifecycle management for user applications. In addition to reverse proxy capabilities, UAM enhances web access protection with built-in mechanisms for improved performance and scalability.
This policy-driven approach simplifies user administration and application integration. Built on the AccessMatrix framework, UAM inherits its key features while adding its own unique capabilities.
The UAM security infrastructure is designed to protect multi-tier applications—both web-based and non-web-based—across heterogenous platforms. The AccessMatrix hierarchical model allows organizations to implement a unified security infrastructure, facilitating easy integration with multiple applications. All access control decisions are managed by the AccessMatrix security server, ensuring high scalability, software reusability, and reduced application maintenance efforts.
With i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAM effectively addresses the administration needs of multi-region and departmental applications, corporate banking systems, Managed Security Providers, and SaaS Providers.
Key features of UAM include:
- Support for Identity Brokering, Federated SSO, Web SSO, and Enterprise SSO, with embedded strong authentication.
- Extensible Pluggable Authentication Modules that meet strong authentication requirements using FIDO2, QR code, E2EE, certificate-based, hardware, software tokens, and SMS.
- Flexible and open APIs for customization, integration, and code reuse for 4As services.
- Compatibility with SAML, OAuth 2.1, and OpenID Connect.
- Tamper-evident audit trails and scalability.
Key benefits of UAM include:
- Simplified integration and deployment with native support for Microsoft Entra ID, LDAP, AD, and JDBC directories—eliminating the need for schema changes or external user store modifications.
- A highly scalable, open, and reliable platform that meets demanding operational requirements, including automatic failover, horizontal and vertical scaling, and 24/7 operations.
- Comprehensive security management and enforcement of 4As, including authentication policies, methods, user stores, administration delegation, and audit compliance reporting.
- Reduced integration and operational costs through a common set of IAM services for custom enterprise and internet applications.
AccessMatrix™ Universal Authentication Server (UAS)
AccessMatrix™ Universal Authentication Server (UAS) is a versatile authentication solution that enables organizations to unify their diverse authentication mechanisms while simplifying integration complexities.
Incorporating i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAS allows organizations to assign security administrators at various levels. This framework can be extended to enable external organizations to manage IDs and user rights through their own security administrators, making it particularly well-suited for Management Security Providers and SaaS Providers.
Key Features:
Versatile Authentication Support: UAS employs a Pluggable Authentication Module (PAM) approach, allowing for easy integration of new authentication methods as they evolve. It supports a wide array of authentication techniques, including passwords, out-of-band methods, biometrics, PKI, knowledge-based authentication, certificates, contextual factors, OTP (both hard and soft), and external authentication integrations.
Comprehensive Token Lifecycle Management: UAS offers complete management of the token lifecycle, including issuance, delivery, handling out-of-sync and lost tokens, temporary access, and replacements. It also features supporting functions such as PIN mailer integration and a robust reporting module.
Embedded Authentication Support: UAS provides out-of-the-box support for tokens from various vendors, including OneSpan (Vasco), i-Sprint YESsafe Token, RSA, and OATH-based vendors. It also offers mobile token integration options, such as Vasco DIGIPASS for mobile, i-Sprint YESsafe OATH-based tokens, and Google Authenticator. Its built-in static ID/password authentication module supports flexible password quality, expiry, and login policies.
Secure Cloud Integration: UAS facilitates secure authentication integration with cloud services using industry standards like SAML and OAuth. Organizations can create authentication workflows that chain multiple methods (e.g., Active Directory authentication combined with DIGIPASS token) to meet specific security requirements. The dynamic authentication flow allows for real-time adjustments based on user group, source IP address, and other contextual factors.
Native Integration with External User Stores: UAS supports integration with various user registries, including LDAP and Active Directory, via LDAP or JDBC (Java Database Connectivity). This allows organizations to connect the Security Server with existing user registries without the need for synchronization.
Optional Key Protection: UAS offers key protection using Hardware Security Modules (HSM). Its out-of-the-box integration with leading HSM vendors provides advanced security features utilizing FIPS (Federal Information Processing Standard)-certified hardware for cryptographic keys.
Comprehensive SDKs: UAS includes extensive SDKs with REST, Java, and .NET APIs, facilitating easy integration with various applications.
Key Benefits:
By deploying i-Sprint UAS, organizations can achieve reduced operational costs through a unified authentication platform, simplified integration and deployment efforts, the capability to address complex authentication requirements, adaptability for future authentication options, and a highly scalable, open, and reliable solution.
AppProtect+
AppProtect+ is a cutting-edge solution that proactively safeguards mobile applications against a wide range of risks and attacks, ensuring secure operation even on heavily infected devices. With its robust callback APIs, AppProtect+ meets user demands by efficiently collecting and transmitting risk data to the server. The upcoming version of AppProtect+ will enhance this capability by actively collecting mobile threat intelligence, further mitigating risks and improving overall security posture.
Unlike traditional antivirus software, AppProtect+ offers protection without the need for virus database updates or internet connectivity. In comparison to hardened app solutions, it effectively prevents passive attacks such as reverse engineering, repackaging, and source code modification. Additionally, AppProtect+ can respond dynamically to real-time threats detected during app execution.
Runtime App Self-Protection (RASP)
Isolation and Proactive Scanning: AppProtect+ isolates applications from their runtime environment, enabling proactive scanning and protection against malicious attacks. This ensures that apps can operate securely, even on rooted or jailbroken devices. For instance, it mitigates risks from screen readers on Android and prevents data theft, such as login credential capture via untrusted third-party keyboards.
Risk Detection Without Internet Connection: A key differentiator of AppProtect+ is its ability to detect risks without requiring an internet connection, unlike traditional virus database matching mechanisms. This capability eliminates potential risks associated with desynchronized databases.
Active Threat Intelligence Collection: The upcoming version of AppProtect+ will include features for actively collecting mobile threat intelligence. This enhancement will allow the solution to analyze emerging threats in real-time, enabling proactive measures to be taken against potential vulnerabilities and attacks.
Four Key Functions:
Anti-Reverse Engineering & Anti-Tampering: AppProtect+ protects APK files from reverse engineering, debugging, and cache attacks using tools like APK Tool, dex2jar, and JEB. Its unique authentication technology halts APK execution if any tampering is detected.
Anti-Debugger: The solution employs white-box encryption technology to prevent code injection, blocking various forms of tampering, including hook attacks, accessibility exploits, phishing, transaction hijacking, and data modification.
Anti-Stealing Measures: AppProtect+ supports data encryption, verifies keyboard trustworthiness, and blocks screenshots. It also implements memory data protection to prevent the capture, hijacking, or tampering of both dynamic and static app data.
Server-Side Client Management: With its callback functionality, AppProtect+ allows users to call server APIs to collect threat and device data. These data can then be used to establish policies for managing client accounts and controlling device access.
Products and Services
Products and Services |
Description |
AccessMatrix™ Universal Access Management (UAM) |
AccessMatrix™ Universal Access Management (UAM) is a robust solution that integrates web single sign-on (SSO), web access management, federated SSO, externalized authorization management, and hierarchy-based delegated administration. Built on AccessMatrix™ technology, UAM delivers comprehensive application security through secure Administration, Authentication, Authorization, and Audit services (4As) tailored for business applications in regulated sectors like banking and finance. This enables custom enterprise and internet applications to leverage a unified set of Identity & Access Management (IAM) services, significantly reducing integration costs.
UAM’s WSA Reverse Proxy secures both web and non-web applications by enforcing access control policies for resources on web and application servers. As a no-code integration solution, it ensures seamless and transparent SSO session lifecycle management for user applications. In addition to reverse proxy capabilities, UAM enhances web access protection with built-in mechanisms for improved performance and scalability.
This policy-driven approach simplifies user administration and application integration. Built on the AccessMatrix framework, UAM inherits its key features while adding its own unique capabilities.
The UAM security infrastructure is designed to protect multi-tier applications—both web-based and non-web-based—across heterogenous platforms. The AccessMatrix hierarchical model allows organizations to implement a unified security infrastructure, facilitating easy integration with multiple applications. All access control decisions are managed by the AccessMatrix security server, ensuring high scalability, software reusability, and reduced application maintenance efforts.
With i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAM effectively addresses the administration needs of multi-region and departmental applications, corporate banking systems, Managed Security Providers, and SaaS Providers.
Key features of UAM include:
- Support for Identity Brokering, Federated SSO, Web SSO, and Enterprise SSO, with embedded strong authentication.
- Extensible Pluggable Authentication Modules that meet strong authentication requirements using FIDO2, QR code, E2EE, certificate-based, hardware, software tokens, and SMS.
- Flexible and open APIs for customization, integration, and code reuse for 4As services.
- Compatibility with SAML, OAuth 2.1, and OpenID Connect.
- Tamper-evident audit trails and scalability.
Key benefits of UAM include:
- Simplified integration and deployment with native support for Microsoft Entra ID, LDAP, AD, and JDBC directories—eliminating the need for schema changes or external user store modifications.
- A highly scalable, open, and reliable platform that meets demanding operational requirements, including automatic failover, horizontal and vertical scaling, and 24/7 operations.
- Comprehensive security management and enforcement of 4As, including authentication policies, methods, user stores, administration delegation, and audit compliance reporting.
- Reduced integration and operational costs through a common set of IAM services for custom enterprise and internet applications. |
AccessMatrix™ Universal Authentication Server (UAS) |
AccessMatrix™ Universal Authentication Server (UAS) is a versatile authentication solution that enables organizations to unify their diverse authentication mechanisms while simplifying integration complexities.
Incorporating i-Sprint’s patented Segmented Hierarchy-Based Security Administration and Authorization Framework, UAS allows organizations to assign security administrators at various levels. This framework can be extended to enable external organizations to manage IDs and user rights through their own security administrators, making it particularly well-suited for Management Security Providers and SaaS Providers.
Key Features:
Versatile Authentication Support: UAS employs a Pluggable Authentication Module (PAM) approach, allowing for easy integration of new authentication methods as they evolve. It supports a wide array of authentication techniques, including passwords, out-of-band methods, biometrics, PKI, knowledge-based authentication, certificates, contextual factors, OTP (both hard and soft), and external authentication integrations.
Comprehensive Token Lifecycle Management: UAS offers complete management of the token lifecycle, including issuance, delivery, handling out-of-sync and lost tokens, temporary access, and replacements. It also features supporting functions such as PIN mailer integration and a robust reporting module.
Embedded Authentication Support: UAS provides out-of-the-box support for tokens from various vendors, including OneSpan (Vasco), i-Sprint YESsafe Token, RSA, and OATH-based vendors. It also offers mobile token integration options, such as Vasco DIGIPASS for mobile, i-Sprint YESsafe OATH-based tokens, and Google Authenticator. Its built-in static ID/password authentication module supports flexible password quality, expiry, and login policies.
Secure Cloud Integration: UAS facilitates secure authentication integration with cloud services using industry standards like SAML and OAuth. Organizations can create authentication workflows that chain multiple methods (e.g., Active Directory authentication combined with DIGIPASS token) to meet specific security requirements. The dynamic authentication flow allows for real-time adjustments based on user group, source IP address, and other contextual factors.
Native Integration with External User Stores: UAS supports integration with various user registries, including LDAP and Active Directory, via LDAP or JDBC (Java Database Connectivity). This allows organizations to connect the Security Server with existing user registries without the need for synchronization.
Optional Key Protection: UAS offers key protection using Hardware Security Modules (HSM). Its out-of-the-box integration with leading HSM vendors provides advanced security features utilizing FIPS (Federal Information Processing Standard)-certified hardware for cryptographic keys.
Comprehensive SDKs: UAS includes extensive SDKs with REST, Java, and .NET APIs, facilitating easy integration with various applications.
Key Benefits:
By deploying i-Sprint UAS, organizations can achieve reduced operational costs through a unified authentication platform, simplified integration and deployment efforts, the capability to address complex authentication requirements, adaptability for future authentication options, and a highly scalable, open, and reliable solution. |
AppProtect+ |
AppProtect+ is a cutting-edge solution that proactively safeguards mobile applications against a wide range of risks and attacks, ensuring secure operation even on heavily infected devices. With its robust callback APIs, AppProtect+ meets user demands by efficiently collecting and transmitting risk data to the server. The upcoming version of AppProtect+ will enhance this capability by actively collecting mobile threat intelligence, further mitigating risks and improving overall security posture.
Unlike traditional antivirus software, AppProtect+ offers protection without the need for virus database updates or internet connectivity. In comparison to hardened app solutions, it effectively prevents passive attacks such as reverse engineering, repackaging, and source code modification. Additionally, AppProtect+ can respond dynamically to real-time threats detected during app execution.
Runtime App Self-Protection (RASP)
Isolation and Proactive Scanning: AppProtect+ isolates applications from their runtime environment, enabling proactive scanning and protection against malicious attacks. This ensures that apps can operate securely, even on rooted or jailbroken devices. For instance, it mitigates risks from screen readers on Android and prevents data theft, such as login credential capture via untrusted third-party keyboards.
Risk Detection Without Internet Connection: A key differentiator of AppProtect+ is its ability to detect risks without requiring an internet connection, unlike traditional virus database matching mechanisms. This capability eliminates potential risks associated with desynchronized databases.
Active Threat Intelligence Collection: The upcoming version of AppProtect+ will include features for actively collecting mobile threat intelligence. This enhancement will allow the solution to analyze emerging threats in real-time, enabling proactive measures to be taken against potential vulnerabilities and attacks.
Four Key Functions:
Anti-Reverse Engineering & Anti-Tampering: AppProtect+ protects APK files from reverse engineering, debugging, and cache attacks using tools like APK Tool, dex2jar, and JEB. Its unique authentication technology halts APK execution if any tampering is detected.
Anti-Debugger: The solution employs white-box encryption technology to prevent code injection, blocking various forms of tampering, including hook attacks, accessibility exploits, phishing, transaction hijacking, and data modification.
Anti-Stealing Measures: AppProtect+ supports data encryption, verifies keyboard trustworthiness, and blocks screenshots. It also implements memory data protection to prevent the capture, hijacking, or tampering of both dynamic and static app data.
Server-Side Client Management: With its callback functionality, AppProtect+ allows users to call server APIs to collect threat and device data. These data can then be used to establish policies for managing client accounts and controlling device access. |
AccessMatrix™ Unified Single Sign-On (SSO) |
AccessMatrix™ Unified Single Sign-On (SSO) Platform is a comprehensive solution that integrates Enterprise Single Sign-On (ESSO), Federated Single Sign-On, Web Single Sign-On, and Mobile Single Sign-On. This Identity Federation platform supports popular identity protocols such as SAML and OAuth, enabling seamless SSO capabilities for cloud and mobile applications. With AccessMatrix™, employees, consumers, customers, and partners can access corporate and cloud applications through a single login process across various operating platforms, including mobile devices. The integration of ESSO, Federated SSO, Web SSO, and Mobile SSO allows for a unified SSO experience across a diverse range of web, non-web, and cloud-based applications in a single deployment.
AccessMatrix™ ESSO facilitates sign-on for any application, enabling single sign-on for Windows® desktop, web, Java™, Flash®, AJAX, custom-built applications, and terminal emulators for Unix, AS400, and mainframe systems without requiring code changes. This is achieved through the installation of an ESSO client agent on the user’s desktop. ESSO also features an optional web interface for launching and signing into target applications, a self-service portal for application enrollment, password recovery, and Windows Active Directory password resets. Additionally, it includes a cryptographically secured offline cache that can be stored on desktops or portable secure storage devices, allowing for offline access. Passwords are automatically synchronized back to the server when connectivity is restored.
AccessMatrix™ Federated SSO serves as a federated authentication gateway, enabling internal corporate users to log in with their existing corporate directory accounts and seamlessly access cloud applications (SaaS) such as Salesforce, WebEx, and Google Apps. It supports various federation standards, including SAML and OAuth, and can function as both an Identity Provider and Service Provider, storing user identities in AccessMatrix™’s internal and external directories.
AccessMatrix™ Web SSO and Mobile SSO Integration provide a unified web-based USO Identity Gateway, allowing organizations to transition from Enterprise SSO to Federated and Web SSO. By alleviating the burden of managing multiple usernames and passwords, USO enhances user experience, reduces support costs, strengthens security, and ensures compliance. In addition to Windows desktops, USO supports SSO capabilities on virtual remote desktops (Citrix, VMware) and mobile devices (Android and iOS). With web security agents for leading web and application servers, Web SSO enables URL-level access control and transparently pushes user information via standard HTTP request headers to assist web applications in establishing user identities. It also supports the mapping of different user IDs across applications to create a unique SSO ID, facilitating co-existence strategies during migration to the AccessMatrix™ Web SSO system.
FIDO2 Integration enhances the security of the AccessMatrix™ platform by enabling passwordless authentication. This standard allows users to authenticate using biometric data or hardware tokens, significantly reducing the risk of phishing attacks and credential theft. By incorporating FIDO2, AccessMatrix™ not only strengthens security but also improves user convenience, as users can log in without the need to remember complex passwords.
Key Benefits:
• A unified platform encompassing Enterprise SSO, Federated SSO, Web SSO, and Mobile SSO, enhancing user convenience and productivity.
• Strengthened security through flexible authentication methods, including FIDO2, maximizing ROI by reducing helpdesk costs.
• Unified SSO access to cloud, web, and desktop applications, enabling rapid deployment and ensuring compliance with robust reporting capabilities.
In summary, AccessMatrix™ Unified SSO Platform stands out for its comprehensive security features, seamless integration capabilities, and user-friendly experience. By addressing the challenges of password management and enhancing security through FIDO2, AccessMatrix™ empowers organizations to streamline access to their applications while maintaining the highest standards of cybersecurity. |