Solutions | Brute Force | Bucket Brigade | Keylogging | Server Breach | Stolen Phone | Stolen PC | Access on mobile | Transaction authorisation | Data at rest |
---|---|---|---|---|---|---|---|---|---|
UNLOQ | |||||||||
QR/Bar code reader (Clef, SQRL) |
|||||||||
Soft token (Authy, Authenticator) |
|||||||||
Hard token (RSA) |
|||||||||
SMS (Twilio) |
|||||||||
Fingerprint reader (Yubikey) |
Through application linking, UNLOQ gives you the tools to protect even for the unlikely case UNLOQ would be breached.
UNLOQ uses valid RSA certificates issued by COMODO and we constantly monitor our status with Qualys SSL Labs. AWS & Bahnhof are secure & certified partners that help us protect your users.
Not anymore. You can deactivate your phone from any computer with an internet connection and remote logout will let you protect your lost PC.
UNLOQ uses AWS and Bahnhof infrastructure with auto scaling enabled.