Keyless AuthenticatorKeyless Technologies
|
KeyoteTeskaLabs
|
|||||
Related Products
|
||||||
About
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
|
About
Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. People have to remember long passwords, and they have to change them frequently. We believe that there is a simpler way how to login: a smartphone. Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Businesses looking for an app that receives push notifications and authorizes authentication attempts through Keyless
|
Audience
Companies and employees seeking a tool for their smartphone to manage logins and secure authentication
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationKeyless Technologies
Founded: 2018
United Kingdom
keyless.io
|
Company InformationTeskaLabs
United Kingdom
teskalabs.com/products/keyote
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
|
||||||
Integrations
Check Point IPS
Check Point Infinity
Multi-Domain Security Management
Sovrin
WatchTower Security Management App
|
Integrations
Check Point IPS
Check Point Infinity
Multi-Domain Security Management
Sovrin
WatchTower Security Management App
|
|||||
|
|