TransAuth FAQ

Questions We Hear A Lot (And Their Answers)

Beta: General

How Does The Beta Program Work?

The TransAuth Beta Program is a sweet deal for everyone involved.

You benefit from using our software to help protect your most valuable digital assets as well as a chance to give us input on what other features you’d like.

We get a chance to have more people test our solution and give us feedback on what we can improve on.

When the Beta Program is done, we will offer a free copy of the first Production version to all Beta users who give us feedback on the solution, as well as a substantial discount for subscriptions.

Everyone wins!

Permalink.

What is Securitooth?

Early Adopter Cred: You just elevated in the ranks of startup luminati

Securitooth was an working project name for the workstation component when we started development.

We have since started referring to it as TransAuth, but haven’t yet taken the time to update the branding.

This will be resolved before we go to production release, but for now, you will have the distinct honor of saying, “I started using TransAuth when it was still called Securitooth”

Permalink.

What is multi-factor authentication?

Multi-factor authentication requires more than a single identifier to be present during access requests.  This helps reduce unauthorized access in case of loss or compromise of a single factor credential.  This is best exemplified with passwords.  If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.

A great example multi-factor authentication is an ATM:

To use an ATM, you need both a card and a PIN.

If you lose the PIN (which is something you know), your account is still secure because you still have your card.

If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.

By requiring both credentials to be present, we can prevent account compromise if you lose either one.

That’s multi-factor!

Permalink.


Beta: Personal Edition

Windows Agent

The Windows Agent is almost ready!

Keep an eye on your inbox, we’re doing final testing before releasing our current agent version. It will offer the following features:

  • Multi-Factor Login Security
  • Integrated Password Manager
  • Integrated OTP passcode generator (requires TransAuth Server. See: Professional Edition)
  • Walk-away Locking
  • Emergency Login Access
  • Safe-mode to prevent accidental lockout

All you need is a Bluetooth-enabled computer and mobile device. No Bluetooth? No problem, pretty much any Bluetooth Dongle will work!

Just install, run the wizard, and you are all set!

Permalink.

OSX Agent

TransAuth for OSX Agent is on the way!

We are working as fast as we can to complete the OSX Agent.  Hang in there, and your patience will pay off big-time!

We expect the agent to be ready in the next 60 days. Sign up for our Beta Access program to get updates and a notification when it’s ready!

Permalink.

Do I have to install something?

Yes, our agent needs to detect the presence of your Key Device to protect your computer.

It is a quick installation and you can remove it at any time.  Our installer has been rated Malware-Free by CNET and Download.com, so install with confidence!

Please note: There is no danger of getting locked out of your computer with the Beta.  We have enabled SafeMode, which allows you to login without TransAuth in case something goes wrong.

Permalink.

What does TransAuth do?

Great question!

TransAuth is a multi-factor authentication platform that helps you protect your computer, online accounts and sensitive data.

It works by making an association with a Bluetooth-enabled device (such as a phone).  This is known as your Key Device, which is known as a possession factor in Security Geek speak.  This means along with your password, your Key Device is required during access requests to your computer.  This essentially protects your computer from compromise in the event of loss or theft of your password.

We use this Key Device to help authenticate you to your computer.  And once you’re authenticated to your computer, we use your Key Device to grant you access to certain functions on your computer, like accessing a password manager and generating secure passwords.

Key Features:

    • Multi-factor computer access control [workstation] – login not permitted without user/pass and Key Device present.
    • Automatic Walk-away locking [workstation] – Lock machine if Key Device is not detected
    • Integrated Password Manager [workstation] – Save complex passwords for your online accounts – requires Key Device
    • One Time Passcode (OTP) soft token [workstation, server] – Easily login to TransAuth-enabled sites without passwords (demo account available to beta users)
    • Google Authenticator support [mobile] – use your phone to generate OTP codes when using other machines (demo account available to beta users)

Permalink.

What is Securitooth?

Early Adopter Cred: You just elevated in the ranks of startup luminati

Securitooth was an working project name for the workstation component when we started development.

We have since started referring to it as TransAuth, but haven’t yet taken the time to update the branding.

This will be resolved before we go to production release, but for now, you will have the distinct honor of saying, “I started using TransAuth when it was still called Securitooth”

Permalink.

What is required to use TransAuth?

TransAuth does have a few requirements:

  1. A supported OS. Currently: Windows XP, Windows 7 or Windows 8 (OSX is coming soon!)
  2. Administrative Access (to install)
  3. Bluetooth on your computer.  If you don’t have Bluetooth yet, any dongle should work.  Here’s one we like from Amazon.
  4. A Bluetooth-enabled phone.  Does not need to be a smartphone.  Bluetooth headsets work too.

Permalink.

What is multi-factor authentication?

Multi-factor authentication requires more than a single identifier to be present during access requests.  This helps reduce unauthorized access in case of loss or compromise of a single factor credential.  This is best exemplified with passwords.  If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.

A great example multi-factor authentication is an ATM:

To use an ATM, you need both a card and a PIN.

If you lose the PIN (which is something you know), your account is still secure because you still have your card.

If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.

By requiring both credentials to be present, we can prevent account compromise if you lose either one.

That’s multi-factor!

Permalink.


Support

What’s Your Privacy Policy?

This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally identifiable information’ (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app?
We do not collect information from visitors of our site.

or other details to help you with your experience.

 

When do we collect information?

 

We collect information from you when you register on our site, place an order, fill out a form, Open a Support Ticket or enter information on our site.

How do we use your information?

 

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

      To allow us to better service you in responding to your customer service requests.
      To quickly process your transactions.

 

How do we protect visitor information?

 

We do not use vulnerability scanning and/or scanning to PCI standards.
We only provide articles and information. We never ask for personal or private information like names, email addresses or credit card numbers.
We do not use Malware Scanning.

We do not use an SSL certificate
      We do not need an SSL because:
any payment information is encrypted by our provider.

 

Do we use ‘cookies’?

 

Yes. Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the site’s or service provider’s systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.
We use cookies to:
      Help remember and process the items in the shopping cart.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn the correct way to modify your cookies.
If users disable cookies in their browser:

 

If you disable cookies off, some features will be disabled It will turn off some of the features that make your site experience more efficient and some of our services will not function properly.

 

However, you can still place orders

interfere with shopping experience

over the telephone .

Third-party disclosure

 

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.

 

Third-party links

 

We do not include or offer third-party products or services on our website.

 

Google

 

Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en

We use Google AdSense Advertising on our website.
Google, as a third-party vendor, uses cookies to serve ads on our site. Google’s use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.
We have implemented the following:
      Demographics and Interests Reporting

 

We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Opting out:
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising initiative opt out page or permanently using the Google Analytics Opt Out Browser add on.

 

California Online Privacy Protection Act

 

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law’s reach stretches well beyond California to require a person or company in the United States (and conceivably the world) that operates websites collecting personally identifiable information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals with whom it is being shared, and to comply with this policy. – See more at: https://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf
According to CalOPPA we agree to the following:
Users can visit our site anonymously.
Once this privacy policy is created, we will add a link to it on our home page or as a minimum on the first significant page after entering our website.
Our Privacy Policy link includes the word ‘Privacy’ and can be easily be found on the page specified above.
Users will be notified of any privacy policy changes:
      On our Privacy Policy Page
Users are able to change their personal information:
      By logging in to their account
How does our site handle do not track signals?
We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It’s also important to note that we do not allow third-party behavioral tracking

 

COPPA (Children Online Privacy Protection Act)

 

When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.

We do not specifically market to children under 13.

 

Fair Information Practices

 

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
      Within 7 business days
We will notify the users via in-site notification
      Within 7 business days
We also agree to the Individual Redress Principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

 

CAN SPAM Act

 

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:
      Send information, respond to inquiries, and/or other requests or questions.
      Process orders and to send information and updates pertaining to orders.
To be in accordance with CANSPAM we agree to the following:
      NOT use false or misleading subjects or email addresses.
      Identify the message as an advertisement in some reasonable way.
      Include the physical address of our business or site headquarters.
      Monitor third-party email marketing services for compliance, if one is used.
      Honor opt-out/unsubscribe requests quickly.
      Allow users to unsubscribe by using the link at the bottom of each email.

If at any time you would like to unsubscribe from receiving future emails, you can email us at
[email protected] and we will promptly remove you from ALL correspondence.

Contacting Us

 

If there are any questions regarding this privacy policy you may contact us using the information below.

transauth.com
1825 Pierce St NE

Minneapolis, MN 55418

USA
[email protected]
866.628.6665
Last Edited on 2016-05-18

Permalink.

What’s Your Return Policy?

Since we sell software and not tangible goods, we do not feel an official Return Policy was fitting.

However, we do offer flexible pilot and proof-of-concept programs to allow prospective customers a chance to make sure we are a good fit for their needs.  If for any reason a customer determines we are not a good fit after purchase, we will work with them to make things right.

We would rather have a happy friend than a cross customer.

Permalink.

What Does The Solution Require?

Individuals: Computer, our agent, a wireless device.

Organizations: Computers, Active Directory, GPO, Package Deployment Solution

Permalink.

How do I install?

Download the agent installer and save the file somewhere.

Double-click the installer an follow the wizard.

Have your intended Bluetooth device ready, and preferably already paired with your machine.

Complete the wizard and log out and back in again!

Permalink.

What OSes do you support?

We currently support:

Windows 7, 8 and 10.  

OSX 10.4 and above

Permalink.

I can’t install

You must have administrative permissions, or run the installer as an Admin

Permalink.

I can’t get the agent to run

The agent only supports one active user at a time.  Please ensure another active user is not logged in currently with the agent running.

This is a known limitation and will be addressed in a future release.

Permalink.

My OTP Codes aren’t working

If they have never worked, please try deleting and recreating your user account, and ensure that your device name is appended to the username in the login field:

user: jjones

device: iphone

login: jjones/iphone

If your logins used to work, but have stopped, please check to see if you might have the incorrect PIN cached in the agent dialog.  To clear this problem, stop and restart the agent.

Permalink.


General

How does TransAuth work?

It works like this y’all

Permalink.

What Does The Solution Require?

Individuals: Computer, our agent, a wireless device.

Organizations: Computers, Active Directory, GPO, Package Deployment Solution

Permalink.

Who Is TransAuth For?

Users, Organizations, Service Providers

Permalink.

How Does The Solution Work?

TransAuth uses a new design called Leveraged Trust to help secure both local and remote resources.  By securing access to the device, we can lower risk to the resources it has access to.

To accomplish this, protected systems install our Agent.  This Agent continuously monitors the credentials presented by a given user.  The state of the local user credentials can then be used to help inform decisions for requests to other resources.  Our TransAuthentication Server can be used to integrate access to remote access solutions and applications as well.

Permalink.

What Do I Need To Use TransAuth?

At a bare minimum, you need a user account, the TransAuth Agent and a Bluetooth-enabled Key Device.

More advanced implementations may require virtual or physical servers, external user directories, and more.

Permalink.

Which Edition Do I Want?

These three editions are designed to fit most users and organizations.  If you have specific needs that don’t match one of these, please let us know and we may be able to put something together just for you.

Personal: Protects local machine access from unauthorized use.  An integrated password manager helps secure passwords to applications and online resources.  More awesome features coming soon!

Service Provider: Includes all the features of the Personal Edition, and adds a more flexible Agent deployment scheme, the TransAuthentication Server and unlimited Agents.  This is ideal for any service provider who wants to protect their user’s accounts or data.  Show your users you care!  Pricing based on total number of authentication events (not users)

Professional: Includes all the features of the Personal Edition, adds the TransAuthentication Server and our Centralized Configuration Management framework.  This solution works well organizations of any size from SMB to Global Enterprise.  Our unique design improves productivity and security at the same time.

Permalink.

OSX Agent

TransAuth for OSX Agent is on the way!

We are working as fast as we can to complete the OSX Agent.  Hang in there, and your patience will pay off big-time!

We expect the agent to be ready in the next 60 days. Sign up for our Beta Access program to get updates and a notification when it’s ready!

Permalink.

What is multi-factor authentication?

Multi-factor authentication requires more than a single identifier to be present during access requests.  This helps reduce unauthorized access in case of loss or compromise of a single factor credential.  This is best exemplified with passwords.  If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.

A great example multi-factor authentication is an ATM:

To use an ATM, you need both a card and a PIN.

If you lose the PIN (which is something you know), your account is still secure because you still have your card.

If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.

By requiring both credentials to be present, we can prevent account compromise if you lose either one.

That’s multi-factor!

Permalink.

Still don’t see your answer? Ask away!

Your Name (required)

Your Email (required)

Your Phone

Your Message

Please leave this field empty.

Back to Top