Welcome Xcellator

XcellSecure SM | Accops HyID

Enables organizations to monitor exactlywho accessed what from where and when.

Simplified One-Time-Password & Multi-FactorAuthentication. One Time Password, DigitalCertificates, & Biometrics-based authentication.

Buy Now Schedule Demo Take Tour Play Video
hyid

comparision

Features Accops Others
OTP based two factor authentication
Out of band tokens: SMS, Email
Mobile App Token
Software PC Token Limited
Biometric authentication Limited
Secures VPN, other network services
RADIUS support
Works with AD/LDAP
Works for Workgroup users
Secures Windows PC/Server login Limited
Secures Linux PC/Server login Limited
Secures RDP to servers Limited
Secures SSH to servers Limited
Works in offline mode to support anywhere access Limited
Rescue mode for locked users Limited
No configuration on user PC
Support for cloud deployment Limited
Auto update agent Limited

overview

HyID provides flexible, simplified and integrated multi-factor authentication services for user authentication, including One Time Password, Digital Certificates, and Biometrics-based authentication.

Using HyID, organizations can protect critical business applications from misuse by internal and external users. HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, device hardware ID & PKI. HyID protects the corporate resources from unchecked access by privileged users and provides detailed audit logs about who accessed what, from where and what time. The system can generate alerts based when an access by a user invalidates the set risk thresholds, enabling organizations to detect and prevent identity thefts and privilege rights misuse.

key benefits

Identity Management

Provide contextual access to privilege accounts, achieve compliance, decrease risk & streamline administration.

Flexible Authentication

Provides One-Time-Password via multiple tokens including SMS, email, PC software and mobile application.

Detailed Auditing

Proof of identity through detailed auditing & multi-factor authentication for secure access

Secure Application

Provide extra layer of security over any application for authorized users fortifying corporate data.

advantages

Flexible Authentication Methods

OTP, digital certificates, biometric, mobile token.

Detailed Auditing

Complete user profiling based on user identity.

Seamlessly Integrated

Seamless integration with any corporate application.

Audit Privilege User Access

Enable contextual access user privilages.

Secure Windows Logon

Secure authentication during desktops logon

Flexible Authentication Methods

OTP, digital certificates, biometric, mobile token.

Features

Resource
Detailed Auditing & Monitoring

With HylD, Organizations can track and audit who accessed the corporate resources,

Read More
Resource
Availability

HyID is available as part of HySecure gateway. HyID can be bought as a standalone product (no HySecure functions) or as an add-on

Read More
Resource
Flexible Token Support

HyID provides One-Time-Password via multiple tokens including SMS, Email, PC Software

Read More
Resource
Integrate with Any Application

HylD provides REST based API to be integrated with any Application. The REST based API are very simple and provides a workflow for

Read More
Resource
Protect Network Logins

HylD has built-in RADIUS and TACACS based interface to integrate with any managed network equipment that supports two factor

Read More
Resource
Protect Desktop Logins

As the entry point to any corporate work space access is the Desktop or the Shell access where HyID can protect the Microsoft Windows Login and Linux Login.

Read More
Resource
Privilege Access Audit & Control

Using HyID, organizations can track, control and audit privilege access by the IT teams, support teams, developers and consultants who needs

Read More
Resource
Multi-Factor Authentication

HyID secures corporate resources with multiple factor authentication techniques. HylD can enable One-Time-Password based protection on

Read More

FREQUENTLY ASKED QUESTIONS

Two-factor authentication is a type of multi-factor authentication that requires two forms of validation to access an account. These two factors include something you know (e.g., a password) and something you have (e.g., a mobile device). Adding the second factor to the current password login process (which is single factor authentication) significantly reduces your vulnerability to security attacks and someone signing in to your account. Even if your password is compromised, your account is still protected.
Two-factor authentication significantly improves the security of your Login ID. After you turn it on, signing into your account will require both your password and access to your trusted devices or trusted phone number. To keep your account as secure as possible and help ensure you never lose access, there are a few simple guidelines you should follow:
• Remember your Login ID and Password.
• Use a device passcode on all your devices.
• Keep your trusted phone number(s) up to date.
• Keep your trusted devices physically secure.

HyID Authentication can be done in following ways:
• Soft Token (Mobile Based Soft Token Password) (Does not require Internet)
• OTP on SMS
• OTP on Mail
• OTP on both SMS and Mail.

No, HyID at Accops is easy to setup, regardless if you’re an admin or a user.
From an admin’s perspective, enabling HyID throughout the Organization takes a couple of minutes by creating a HyID permission set and assigning that permission set to users, whether as groups or as individuals.
From a user’s perspective, setting up HyID is very quick and easy
If you receive a notification (a login alert via text message/E-Mail) that you did not initiate via the login process, your Login password may have been compromised. Reject the login and change your Login password as soon as possible using Self Service Portal.

ACCOPS HYID DESKTOPS RESOURCES

Related Products & Services

Business email

Business Email

Our Business Email package comes with a storage space of 5GB per account. This is dedicated to file storage and also backs up all your mails on our state of the art infrastructure, making sure you never experience a loss of mails

Microsoft Integration_1

Microsft 365

Includes Office 365, Windows 10 & Enterprise Mobility + Security. Learn More Now. Trusted & Secure. Secure Cloud Service. Intelligent Security. Built For Teamwork. Achieve More Together.

Email signature

E-mail Signatures

Microsoft Office 365, Exchange Server and G Suite solutions for email signatures, archiving, email utilities & more.