Questions We Hear A Lot (And Their Answers)
The TransAuth Beta Program is a sweet deal for everyone involved.
You benefit from using our software to help protect your most valuable digital assets as well as a chance to give us input on what other features you’d like.
We get a chance to have more people test our solution and give us feedback on what we can improve on.
When the Beta Program is done, we will offer a free copy of the first Production version to all Beta users who give us feedback on the solution, as well as a substantial discount for subscriptions.
Everyone wins!
Early Adopter Cred: You just elevated in the ranks of startup luminati
Securitooth was an working project name for the workstation component when we started development.
We have since started referring to it as TransAuth, but haven’t yet taken the time to update the branding.
This will be resolved before we go to production release, but for now, you will have the distinct honor of saying, “I started using TransAuth when it was still called Securitooth”
Multi-factor authentication requires more than a single identifier to be present during access requests. This helps reduce unauthorized access in case of loss or compromise of a single factor credential. This is best exemplified with passwords. If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.
A great example multi-factor authentication is an ATM:
To use an ATM, you need both a card and a PIN.
If you lose the PIN (which is something you know), your account is still secure because you still have your card.
If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.
By requiring both credentials to be present, we can prevent account compromise if you lose either one.
That’s multi-factor!
The Windows Agent is almost ready!
Keep an eye on your inbox, we’re doing final testing before releasing our current agent version. It will offer the following features:
All you need is a Bluetooth-enabled computer and mobile device. No Bluetooth? No problem, pretty much any Bluetooth Dongle will work!
Just install, run the wizard, and you are all set!
TransAuth for OSX Agent is on the way!
We are working as fast as we can to complete the OSX Agent. Hang in there, and your patience will pay off big-time!
We expect the agent to be ready in the next 60 days. Sign up for our Beta Access program to get updates and a notification when it’s ready!
Yes, our agent needs to detect the presence of your Key Device to protect your computer.
It is a quick installation and you can remove it at any time. Our installer has been rated Malware-Free by CNET and Download.com, so install with confidence!
Please note: There is no danger of getting locked out of your computer with the Beta. We have enabled SafeMode, which allows you to login without TransAuth in case something goes wrong.
TransAuth is a multi-factor authentication platform that helps you protect your computer, online accounts and sensitive data.
It works by making an association with a Bluetooth-enabled device (such as a phone). This is known as your Key Device, which is known as a possession factor in Security Geek speak. This means along with your password, your Key Device is required during access requests to your computer. This essentially protects your computer from compromise in the event of loss or theft of your password.
We use this Key Device to help authenticate you to your computer. And once you’re authenticated to your computer, we use your Key Device to grant you access to certain functions on your computer, like accessing a password manager and generating secure passwords.
Early Adopter Cred: You just elevated in the ranks of startup luminati
Securitooth was an working project name for the workstation component when we started development.
We have since started referring to it as TransAuth, but haven’t yet taken the time to update the branding.
This will be resolved before we go to production release, but for now, you will have the distinct honor of saying, “I started using TransAuth when it was still called Securitooth”
TransAuth does have a few requirements:
Multi-factor authentication requires more than a single identifier to be present during access requests. This helps reduce unauthorized access in case of loss or compromise of a single factor credential. This is best exemplified with passwords. If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.
A great example multi-factor authentication is an ATM:
To use an ATM, you need both a card and a PIN.
If you lose the PIN (which is something you know), your account is still secure because you still have your card.
If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.
By requiring both credentials to be present, we can prevent account compromise if you lose either one.
That’s multi-factor!
or other details to help you with your experience.
over the telephone .
Minneapolis, MN 55418
Since we sell software and not tangible goods, we do not feel an official Return Policy was fitting.
However, we do offer flexible pilot and proof-of-concept programs to allow prospective customers a chance to make sure we are a good fit for their needs. If for any reason a customer determines we are not a good fit after purchase, we will work with them to make things right.
We would rather have a happy friend than a cross customer.
Individuals: Computer, our agent, a wireless device.
Organizations: Computers, Active Directory, GPO, Package Deployment Solution
Download the agent installer and save the file somewhere.
Double-click the installer an follow the wizard.
Have your intended Bluetooth device ready, and preferably already paired with your machine.
Complete the wizard and log out and back in again!
You must have administrative permissions, or run the installer as an Admin
The agent only supports one active user at a time. Please ensure another active user is not logged in currently with the agent running.
This is a known limitation and will be addressed in a future release.
If they have never worked, please try deleting and recreating your user account, and ensure that your device name is appended to the username in the login field:
user: jjones
device: iphone
login: jjones/iphone
If your logins used to work, but have stopped, please check to see if you might have the incorrect PIN cached in the agent dialog. To clear this problem, stop and restart the agent.
It works like this y’all
Individuals: Computer, our agent, a wireless device.
Organizations: Computers, Active Directory, GPO, Package Deployment Solution
Users, Organizations, Service Providers
TransAuth uses a new design called Leveraged Trust to help secure both local and remote resources. By securing access to the device, we can lower risk to the resources it has access to.
To accomplish this, protected systems install our Agent. This Agent continuously monitors the credentials presented by a given user. The state of the local user credentials can then be used to help inform decisions for requests to other resources. Our TransAuthentication Server can be used to integrate access to remote access solutions and applications as well.
At a bare minimum, you need a user account, the TransAuth Agent and a Bluetooth-enabled Key Device.
More advanced implementations may require virtual or physical servers, external user directories, and more.
These three editions are designed to fit most users and organizations. If you have specific needs that don’t match one of these, please let us know and we may be able to put something together just for you.
Personal: Protects local machine access from unauthorized use. An integrated password manager helps secure passwords to applications and online resources. More awesome features coming soon!
Service Provider: Includes all the features of the Personal Edition, and adds a more flexible Agent deployment scheme, the TransAuthentication Server and unlimited Agents. This is ideal for any service provider who wants to protect their user’s accounts or data. Show your users you care! Pricing based on total number of authentication events (not users)
Professional: Includes all the features of the Personal Edition, adds the TransAuthentication Server and our Centralized Configuration Management framework. This solution works well organizations of any size from SMB to Global Enterprise. Our unique design improves productivity and security at the same time.
TransAuth for OSX Agent is on the way!
We are working as fast as we can to complete the OSX Agent. Hang in there, and your patience will pay off big-time!
We expect the agent to be ready in the next 60 days. Sign up for our Beta Access program to get updates and a notification when it’s ready!
Multi-factor authentication requires more than a single identifier to be present during access requests. This helps reduce unauthorized access in case of loss or compromise of a single factor credential. This is best exemplified with passwords. If a password or lost, or stolen, an attacker can simply use the password to gain access to a protected resource.
A great example multi-factor authentication is an ATM:
To use an ATM, you need both a card and a PIN.
If you lose the PIN (which is something you know), your account is still secure because you still have your card.
If you lose your card (which is something you have, like your phone), your account is still secure because you still have your PIN.
By requiring both credentials to be present, we can prevent account compromise if you lose either one.
That’s multi-factor!
Comments are closed.