Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Control access to all your business applications and services from a centralized platform. Utilize an intuitive drag-and-drop interface to design workflows, forms, and processes that are accessible to non-technical users. A user-friendly experience fosters higher adoption rates and promotes training among users. You can filter and schedule compliance certifications based on users, groups, or applications. Support staff is available around the clock to assist with any inquiries. Regular updates to documentation and video tutorials ensure that users stay informed. The no-code design empowers team leaders to manage their own applications and user access. You can establish both static and dynamic attribute-based roles to streamline entitlements and access. Pricing is straightforward and based on individual users, with all features included—no hidden costs for additional functionalities. This system effectively removes the need for passwords, reducing the risk of phishing attacks and minimizing IT service requests related to password resets. Each resource, including service requests, applications, entitlements, or roles, adheres to a designated approval workflow, ensuring that all access requests are properly vetted. By implementing this streamlined approach, organizations can enhance security and operational efficiency significantly.
Description
Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more.
LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more.
LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Array APV Series
Azure Marketplace
Barracuda SSL VPN
Check Point Infinity
Cisco Adaptive Security Appliance (ASA)
Cisco Identity Services Engine (ISE)
F5 BIG-IP
Freshdesk
GlobalProtect
Integrations
Amazon Web Services (AWS)
Array APV Series
Azure Marketplace
Barracuda SSL VPN
Check Point Infinity
Cisco Adaptive Security Appliance (ASA)
Cisco Identity Services Engine (ISE)
F5 BIG-IP
Freshdesk
GlobalProtect
Pricing Details
$70/user/year
Free Trial
Free Version
Pricing Details
$3/month/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Sath
Country
United States
Website
sath.com/idhub/
Vendor Details
Company Name
Cyphercor
Founded
2011
Country
Canada
Website
www.logintc.com
Product Features
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service