In the era of numerous cyber threats, we offer a modern security platform designed for strong user authentication and operation authorization: Comarch tPro family cooperating with Comarch IAM Authentication Server on the back-end. The solution, offered both in the cloud and on-premises models, is designed for SMEs. It allows them to maintain accountability, secure service access (2FA), and sign documents online.
tPro is a response to the surging wave of attacks, also aimed at corporate accounts and remote services.
One of the most effective methods of protecting access to such services are 2FA tools in the form of hardware tokens or advanced mobile solutions. Particularly noteworthy are those that guarantee the incontestability of data presented and effectively protect user cryptographic material. This type of solution is offered by Comarch both in the form of a hardware token (tPro ECC) and an advanced mobile application (tPro Mobile).
The tPro ECC solution is a hardware token based on elliptic curves cryptography. It is equipped with an HPD (Human Presence Detection) mechanism allowing for protection against remote attacks. Its authentication process requires the user to press a button located on the token’s housing. A universal communication protocol with a web browser, designed especially for this purpose, does not require the installation of additional plugins.
In combination with Comarch IAM Authentication Server, tPro Mobile supports digital signing of documents, thanks to which they are protected against unauthorized change. The documents may be invoices or other fiscal documents.
Such division allows for quick and convenient integration even in the case of already existing applications. Additionally, tPro Mobile is also offered as a collection of tPro MobileSDK programming libraries. This makes it possible to add a security layer to the existing applications while retaining all tPro’s advantages.
Together with Comarch IAM Authentication Server, the products of the tPro family constitute a ready-made, comprehensive solution for securing authentication and authentication operations, providing effective protection against attacks such as:
Tell us about your business needs. We will find the perfect solution.