January 11, 2013 •
We always get questions from potential customers and prospects regarding LoginTC’s differences from other two-factor solutions in the marketplace.
With the launch of LoginTC Blog we plan to post answers and commentary related to LoginTC, which will facilitate a business or technical conversation on our two-factor authentication solution.
The main differences between LoginTC and other two-factor solutions in the marketplace are:
LoginTC is a wireless two-factor credential that leverages mobile platforms’ networks to notify users. This is a very important distinction between a number of solutions out there that use SMS or IVR (Interactive Voice Response) systems to deliver OTPs (one time passwords) or notifications to users. This distinction allows LoginTC users to be notified worldwide via the Apple, BlackBerry and Android notification systems without incurring SMS or long distance fees. This notification is also secure, because LoginTC Cloud uses digital certificates to establish communication with these mobile networks.
LoginTC is a Cloud service. This is a very powerful differentiator for two reasons: i) Organizations that deploy LoginTC services don’t need to invest capital in hardware appliances; and ii) Demand for usage and volumes can be met by leveraging the scalability and elasticity of cloud computing. We have a LoginTC Virtual Appliance that the client organization can deploy on-premise in a Private or Hybrid Cloud, your choice. The LoginTC Virtual Appliance can be licensed and installed in existing virtualization host systems such as VMware or VirtualBox technologies.
LoginTC is the first two-factor solution that scales. Whether the client wants to enable two-factor for hundreds of employees or tens of thousands of customers, LoginTC supports the scalability and performance required. There is no other two-factor solution today that can operate locally, nationally or globally for your access control needs.
LoginTC doesn’t need users’ Personally Identifiable Information (PII) to work. Once again, this is a very powerful differentiator from our competitors because LoginTC doesn’t need a phone number, date of birth, or passwords to enable a LoginTC credential. This is how LoginTC works:
LoginTC supports Smartphones, Tablets AND Desktops (via Google Chrome). The LoginTC app can be notified of an authentication transaction via the cellular data networks, a WiFi connection, the BlackBerry Internet Service, or Google Cloud Messaging. This capability allows LoginTC app to be installed not only on smartphones but also on tablets (such as iPad, iPad Mini or Android tablets that can connect to a cellular data network or a WiFi network) as well as on desktops. The LoginTC app also works on Apple’s iPod Touch.
Multi-layer security support. The latest LoginTC app release has enhanced capabilities to deliver security features not found in any two-factor competitor solution:
LoginTC is the most cost-effective two-factor credential in the marketplace. With enterprise pricing and volume discounts, LoginTC is priced competitively based on an annual subscription fee, with no hidden costs on seeds, maintenance or adminsitration of hard or soft tokens.
Hopefully these 7 points help fuel the corporate conversation surrounding two-factor authentication and make your decision to deploy LoginTC a lot easier. If you have any questions / feedback, please don’t hesitate to for more information.
Start protecting your enterprise assets within minutes. Get Started