Graphic Airlock Secure Acces Hub


Strong, adaptable and user-friendly

As convenient as possible, as secure as necessary – this principle is especially important when it comes to authentication, as too little security endangers the user’s data but too much will severely impact user-friendliness. The Secure Access Hub can adapt to meet the needs of users and the requirements of CISOs alike.

Strong authentication

Social engineering and phishing are still the most widespread forms of attack on the Internet. Such attacks are designed to steal secret authentication information, such as a password.

Airlock supports a variety of strong authentication methods that successfully prevent social engineering and phishing, whilst ensuring an optimal user experience. Push authentication is an excellent example where a user logs in securely without the need to enter a password or a PIN number. Biometric methods, such as Touch ID or Face ID, can also be used for all applications.

Adaptive authentication

Strong authentication with two factors is standard today for business-critical web applications. In daily use, however, users often consider this security measure to be rather inconvenient.

This is precisely where risk-based authentication, also known as ‘adaptive authentication’, will improve the user experience. Instead of requiring users to enter the second factor for every login, the context of an access attempt is analysed and compared with previous sessions by the same user. Factors considered include the network in which users are operating, where they are logging in from and which browser they are using. In cases where users wish to access services from their usual workstation on the intranet or from their home offices, the second factor can be dispensed with.

User identities are also stored in the browser using the ‘remember me’ function, and re-used for future log-ins.

Step-up authentication

Step-up authentication is another option for implementing high-level security in a user-friendly manner. Instead of enforcing the highest level of security from the outset, security is limited to the necessary level. In areas where no authentication is needed, none is requested. In areas where moderate security is required, a simple authentication will suffice. The second factor is applied only when an area is accessed, where enhanced trust levels are essential. This stage-by-stage increase in trust levels is called ‘step-up’ authentication and is simple and easy to deploy for all applications.

Authentication highlights

  • A range of commercial authentication options can be integrated into Airlock IAM
  • Interfaces with various open-source authentication options
  • Single Sign-on
  • Simple token migration via user self-services
  • Risk-based authentication
  • Flexible step-up procedures
  • Social login and registration
  • Remember-me function
  • Identity federation of all relevant standards
  • Identity propagation

Ready for excellent IT security?

Contact us now.
Ergon Informatik AG+41 44 268 87 00

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge