Crypteron
Try Free
Log In
  • Features
  • Pricing
  • Documentation
    • Developer Guide
    • Frequently Asked Questions
    • Support
  • Compliance
    • Compliance FAQ
    • PCI compliance (eCommerce)
    • HIPAA compliance (Healthcare)
    • Security Checklist
  • Blog
  • Contact
Log In Try For Free

TotalAuth by Crypteron

Multi-Factor Authentication

Combine PIN/password, a mobile device, biometrics, geo-location and time to authenticate your users and protect your system. Risk-based, multi-factor authentication that leverages sensor data and user patterns.

Tell me more
TotalAuth
  • Features
  • How It Works
  • Tell me more

Multi-factor authentication is already becoming a requirement across various regulatory and compliance standards including NERC and FFIEC. TotalAuth is a multi-factor authentication solution that presents five layers of security that only allows authorized users to access your system. TotalAuth has been designed from the ground up to offer an industry leading level of security that is extremely easy to use. With our TotalAuth Mobile app, a user can authenticate in less than 20 seconds using the most secure, front-end authentication solution on the market. Whether it is for ensuring that employees have access to a highly sensitive internal system or customers have access to a cloud-based commercial application, TotalAuth offers the highest level of security.

TotalAuth incorporates 5 robust factors in a unique way to authenticate your users and protect your system:

  • Password/PIN: A 6-digit PIN is provided on a numerically randomized keypad to protect against replay attacks
  • Mobile Phone: A unique token is generated during installation of the TotalAuth Mobile app
  • Biometrics: Our facial recognition provides the most secure form of biometric identification available
  • Geo-location: The location of the user is used to ensure that the user’s access is restricted to certain geographic locations
  • Time: A user’s access can be restricted to predetermined times
index
User PIN
index2
Numeric Token
index3
Biometric + Face Logging
index4
Location + Time

How It Works

TotalAuth In Action

Reliable and Scalable

Our software functions completely independently from primary authentication. This means that TotalAuth never sees your users’ passwords or any personal information. The rest of your existing authentication system doesn’t need to be disturbed. In addition, our middleware is hardware agnostic and automatically scales with your application.

Tell Me More

Someone will get in touch with you soon!
True, next-gen cloud databaseCurrent cloud deployments
Product Microsoft Azure SQL Amazon RDS SQL Server Amazon RDS MySQL SQL Server MySQL
Type Database-as-a-service Infrastructure-as-a-service
(VMs in the cloud)
Industry trend
Data-at-rest encryption No encryption possible, application layer encryption like CipherDB required for any security Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter) Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter)
Why CipherDB? Enables Strong data encryption to protect your data-at-rest. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately so a database server breach still keeps your data safe. More secure and advanced AES-GCM modes at 256bit key sizes. Even the National Security Agency (NSA) approves AES256-GCM for protecting top-secret government secrets. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. More secure and advanced AES-GCM modes at 256bit key sizes.
Infrastructure management Fully automated. Full independence from underlying (virtual) hardware.
Database administration costs drastically reduced
Mostly automated. Partial dependence on the specifications of the underlying (virtual) hardware.
Database administration costs reduced.
Fully responsible for the management, patching and upkeep of your virtual servers. Database administration is still a complex task requiring a dedicated operations team.
Scale and reliability Excellent Good Moderate scalability. Reliability a challenge as you are responsible for server maintenance.

Want to know more?

Enter your email below and we’ll get in touch with you.

Recent blog posts

Encryption

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

code

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

KeyManagement

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

google-cloud-exploitation-featuredimage

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

startup-whiteboard

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

banner

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

community

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

mouse

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

crowd

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

code

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.

Company

  • Executive Team
  • Contact us

Legal

  • Terms of Service
  • Privacy Policy

Social

  • Twitter
  • Facebook
  • LinkedIn

© Crypteron™ 2013 and protected by one or more patents.
Crypteron, CipherDB, CipherStor, CipherObject, TotalAuth and DosCipher are all trademarks of Crypteron Inc. All rights reserved.

Try Crypteron for Free!

Registration is almost complete! We sent an email to:

Please check your email to activate your account. If you do not receive an email, please contact support.