Turn on Multi-Factor Authentication on Your Services
Turn any web browser or native App into a 2-factor authentication token
You are no longer happy with passwords ... but traditional approach of strong authentication adds additional steps leading to user push back, on top of being expensive and cumbersome to manage.
Whether you are an IT Department, a SaaS vendor, an Identity Provider, or any other kind of online Service Provider, inWebo provides with light APIs you can use to litteraly turn on multi-factor authentication.
No hardware, no extra piece of software, no certificate, no need to enroll users mobile phone numbers, etc. Defining her password on your site or in your App is all the user will see. Check out our developer web site, or read more about inWebo exclusive In-App Token and Cloud Token.
Need out-of-band authentication or transaction sealing?
If you have your own native App, read more about inWebo In-App Token. Otherwise, just refer inWebo Authenticator or nCode to your users; these Mobile Tokens are available for free on all mobile platforms and are activated for your service in a few clicks.
Enterprise ID & SSO
Turn to inWebo Desktop Token for strong authentication requirements from corporate Mac or PC. A user-friendly menu automates 2-factor connection to any application on computers (starting with IE6!).
Affordable strong authentication
inWebo provides free 2-factor authentication tokens for any device and client environment. Use them to facilitate and secure access to your services, business applications (Cloud/SaaS), websites, Apps, etc.
All you need is to transmit a personal activation key to your users through whatever channel you think appropriate. Entering or just approving this key in an inWebo soft-token and defining their secret code is enough.
Highly secured soft-tokens for any environment
InWebo free authentication tokens provide significant cost reduction compared to traditional hardware tokens – smartcard readers, one-time-password displays, etc. - while maintaining similar security levels. With no additional integration on your side, you can use any handsets or equipment that your users already have - computers, cellphones, smartphones, tablets, gaming consoles or TV - to make their access and transactions secure.
These secure soft tokens result from several years of R&D in our labs and are unique on the market
Besides having a secure design, these tokens are also very easy to use, compared to traditional security tools requiring cumbersome operations and obtaining poor user adoption rates.