Passwordless Authentication and Encryption At Source

This is an SDK that contains a set of APIs for implementing passwordless authentication and encryption in mobile and web applications. It eliminates the use of passwords on proprietary systems and thus prevents phishing and malware fraud.

It enables integration without complexity (avoiding failures during the process) and implementation of encryption to protect data in legacy systems: data is encrypted before it even leaves the device, making it unreadable to third parties.

With Sikur ID SDK it is possible to prevent the main cyber security problems: credential theft breaches and data leakage. Consequently, the solution avoids reputational damage, penalties and fines.

Based on security best practices and compliant with the General Data Protection Regulation (GDPR, 2016).

Zero Trust

Passwordless Authentication And Source Encryption

Our Security Mindset

Regulatory

Regulatory

We develop solutions based on best practices and security policies, and in compliance with the General Data Protection Laws

Zero Trust

Zero Trust

We use the concept of Zero Trust – which assumes no trust in networks, devices or users, and requires constant, real-time authentication of users accessing data.

Prevention

Prevention

Our solutions focus on Preventing, not Remedying problems

Complexity

Complexity

Our solutions are low complexity, quick setup and easy onboarding.

Main Vulnerabilities And Average Cost Of Breaches

81%

of hacking-related breaches use stolen or weak passwords.

Source: Verizon, 2020

54%

of ransomware attacks start by stealing credentials.

Source: Dark Reading, 2021

4.62M USD

average total cost of a breach involving ransomware.

Source: IBM, 2021

18.9M USD

average Cost of Financial Losses per data breach (fines, lost business, response).

Source: IBM, 2021

Applicability

1 No more password in mobile app

2 No more login and password on the WEB

3 Transaction validation through cryptographic key

4 Data encryption at source

5 Transaction can be signed with the private key

Features and Benefits

Features

Benefits

Flexible Secure Operational Management

Flexible Secure Operational Management

Main Advantages

No need for passwords

No need for passwords

There are no credentials to steal and/or share, because access occurs without the use of passwords.

Authenticity

Authenticity

User’s non-repudiation is guaranteed. The same account cannot be used on different devices simultaneously.

Data Encryption at Source

Data Encryption at Source

All information generated and transacted on the App can be encrypted at origin, remaining in this state, at rest and/or in transit.

Improve User Experience

Improve User Experience

Besides the increased security, the solution improves usability, facilitating and speeding up access to the systems, since there is no need to remember the password.

Keys for different applications

Keys for different applications

One cryptographic key can be used for several applications or be specific to a particular application (e.g., one key to encrypt the information and another to approve the transactions, or the same key for both)

Regulatory

Privacy by design

All Sikur solutions are designed based on international data protection and privacy standards (such as GDPR and LGPD), which guarantees organizations and governments the avoidance of fines and a competitive advantage in the market.

  • Privacy and Data Protection.
  • Audit.
  • Data processing.
  • Data Loss Prevention – DLP.
  • Secure Managed File Transfer
  • Cybersecurity best practices.
  • Authenticity and Identity Management.