https://store-images.s-microsoft.com/image/apps.41202.9e9a322e-bdfb-4d84-98f2-a12e6d4a49a1.f74b65b6-eeb8-47fa-a952-c7bc71a4ab30.89f06e1a-257a-40f7-a2e8-62fa9cfe5166

Sikur ID

Autor: SIKUR

Sikur ID proposes a robust and strong authentication mechanism to increase security.

Sikur ID makes authentication passwordless, easy, and safe. Reliable authentication processes should be the foundation of any modern system. It is the front door, and the target to break. Weak identification systems, easy to bypass or crack is the primary goal for various attacks methods. Authentication systems must be robust and friendly enough not to touch users' productivity. Still, easy to integrate and manage, from the technology point of view.


MAIN FEATURES: Identity Provider, Authentication, Auditing, and Compliance, Smart Directory, Integration API, White Label. 100% cloud solution, providing credential protection to avoid credential reuse, secure and password-less authentication through the user's mobile device safe area. 

MS Azure cloud capabilities and availability support the product to deliver compliance and information privacy regulations, like GDPR in Europe and LGPD in Brazil.  


HOW WE MANAGE SECURITY? Sikur ID eliminates passwords, stopping push attacks with mobile authentication. Traditional authentication solutions rely on OTP (One Time Password) as 2FA (Second-factor Authentication) codes for protection, which has security gaps and risks. The username/password pair will be dead soon, and Sikur ID deploys passwordless and safe authentication process by using public-key encryption, started by the user mobile device. As an Identity Provider, it delivers a Smart Directory that unifies the authentication experience.


PUBLIC KEY ENCRYPTION: It deploys something unique for user authentication: its private key, eliminating phishing.

SINGLE SING-ON: A central directory for user authentication, ready for integration with security using standard protocols.

NON-REPUDIATION: Blockchain compatible, have control and compliance for user transactions, avoiding fraud.

PRIVACY: No one, but the owner, has access to the private key. There are no backdoors in the authentication; no account take over. 

Rychlý přehled

https://store-images.s-microsoft.com/image/apps.21775.9e9a322e-bdfb-4d84-98f2-a12e6d4a49a1.f74b65b6-eeb8-47fa-a952-c7bc71a4ab30.ea124c69-4bee-44dd-93d3-c4c45bba861f
/staticstorage/acc5465/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.18739.9e9a322e-bdfb-4d84-98f2-a12e6d4a49a1.f74b65b6-eeb8-47fa-a952-c7bc71a4ab30.1f3536b9-25b9-42ad-8fe6-a7fdbe85ca2f
https://store-images.s-microsoft.com/image/apps.1414.9e9a322e-bdfb-4d84-98f2-a12e6d4a49a1.f74b65b6-eeb8-47fa-a952-c7bc71a4ab30.48c3b85b-c482-40ea-8724-1ac67f3a16ab
https://store-images.s-microsoft.com/image/apps.63261.9e9a322e-bdfb-4d84-98f2-a12e6d4a49a1.f74b65b6-eeb8-47fa-a952-c7bc71a4ab30.71b6dd70-6b0a-4d00-8622-66b85ca306ef