Protection for Your Organization’s Ecosystem
nebulaACCESS guarantees the identity of each user through multi-factor dynamic authentication technology, effectively protecting your organization’s entire ecosystem and only allowing access to the authorized users.
The administration website enables convenient management of the entire authentication environment, thanks to its wide range of functions and automation capabilities.
Authentication Tailored to Your Organization’s Needs
nebulaACCESS features a range of content personalization options for each user, depending on the chosen authentication method, to protect your VPN, website, cloud-based corporate applications or workstations:
- With or without PIN
- Configurable PIN length
- Possibility of using active directory code instead of PIN
- Configurable OTP code length
- Additional OTP message text
- Configurable time between requests
- Grid card: formats and forms of distribution of choice; texts, colors and logo can be personalized
- Different forms of distribution
Capacity and Convenience
nebulaACCESS presents multiple easy-to-use robust authentication options for users, from both workstations and when on the move.
- OTP via SMS
- OTP via e-mail
- OTP by grid card
Choose the most suitable authentication method for each user, depending on the data risk involved and your corporation’s budget.
Secure Access Guaranteed on Mobile Devices and Tablets
The vinTOKEN app, with management integrated in the system, easily generates OTP codes in only three steps. It is available on Google Play Store, Apple Store, Windows Phone Store and BlackBerry App World.
Flexibility for Your Authentication Process
Easily manage and control authentication. Through its flexible management system, nebulaACCESS enables you to:
- Automatically create and distribute authenticators based on group policies
- Configure the type of blockage
- Automatically cancel authenticators if users leave
- Integrate different authentication mechanisms at the same time and centralize audit control
- Delegate online access security management
- Implement a single sign-on for online applications
- Create an audit log
- Regenerate forgotten or lost authenticators on demand
- Include business rules in authorization time
- Provide connection with other entities
- Extract and separate the authorization logic from applications
- SSO of online sessions
- It enables the authentication of transactions by traditional challenge-response mechanisms or via QR for iPhone and Android
Token Software in Mobile Application with Four Oath Authentication Systems
- Time-based OTP
- Event-based OTP
- Challenge and numerical response OTP
- QR-based challenge and response OTP
Multiple Authentication Options
- Authentication by digital certificate for any Certification Authority
- Adaptive authentication
- Guaranteed integration with new authentication methods at the client’s request
- OATH Token hardware
Broad Integration Possibilities
- Web frontals
- Systems and applications: API Java, API php, API C#, Servlet HTTP, EAI, RADIUS
- SAP Netweaver, Microsoft Office 365, Citrix Xenapp and VMware
- VPN-SSL: Juniper SA, Cisco ASA, F5 FirePass, Cyberoam, Fortinet, etc.
Robust Authentication for Workstations and Critical Servers
Establish a second authentication factor as well as username and password for each workstation or server, or completely replace the authentication method with nebulaACCESS by synchronizing passwords in an active directory.