Define policies for various applications and user groups by means of a central access management, and benefit from adaptive access policies depending on e.g. network and browser fingerprint.
global cyber-security incidents due to data violation in 2019
Cyber-criminals will make money out of you wherever they can
The consequences of a hacker attack are often more severe than the attack itself: Compensation claims – for example from affected customers – can quickly amount to millions of dollars.
With DoubleClue you will keep track who has what kind of access to your data!
Your Advantage with the Adaptive Policies of DoubleClue
Different Assignment Options
Policies are assigned to interfaces (SAML, RADIUS, REST Web-Services), applications (e.g. CISCO Meraki, Citrix ShareFile, Dropbox etc.) and user groups within the application or interface type.
Hierarchical Inheritance of Policies
The assignment of policies is hierarchically inherited according to the following schema:
Interface > Application > User groups
Implementation of a Default Authentication Method
Users use this default authentication method. In exceptional cases they can use one of the pre-configured methods by putting a special prefix before their user name.
To clearly identify a used device/browser, a unique Browser Fingerprint is calculated. Users can authenticate themselves with user name/password for a certain time period if the Browser Fingerprint matches.
After a user has successfully logged in via MFA, DCEM returns back a session-cookie. This 32 Byte random key is valid within a pre-set time period during which a user can do a “silent login”.
Users who connect themselves with an application from a network which was exempted via Network Bypass function can also authenticate themselves with user name and password.
Request your test version today!
We help you protect your IT infrastructure from security threats. Test DoubleClue for 3 months and experience a new level of security.