<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=265850&amp;fmt=gif">
inbayusers (1) copy.png

CIOs, CISOs, System Administrators & Users

There are three key groups who use idQ® Trust as a Service (TaaS):

  • IT System Administrators
  • Users Needing Access to Systems & Data
  • Executives

IT system administration use idQ TaaS daily. With no physical hardware tokens to ship, manufacture or replace, and no enterprise servers to roll out provisioning, it becomes a breeze. Finally, the need to choose between security and convenience is eliminated. What’s more, there's no requirement for training personnel on how to provision. idQ TaaS enables IT admins to stay focused on what’s truly important.

In a short time, you’ll be saying, "Wow. This was easy to implement. There's very little work to keep it up and running. I'm not having to worry about provisioning new users or setting up accounts. It's simple and straightforward to maintain."

Employees (and others needing access) use idQ TaaS to access to their workstations, log into their desktops or laptops, access enterprise applications and online services. With no usernames or passwords, the need to carry dongles and the need to remember arcane strings and codes become a thing of the past. Resetting passwords becomes a relic of a bygone era.

You’ll be able to finally dispense with the effort and expense of maintaining usernames and passwords. You can get quick, convenient access to all applications without having to think about it.

Executives use idQ TaaS as users and to easily and securely authorize various business transactions, access reporting and ensure platforms, IP and data are secure. You’ll be saying, “Wow, I love this as a user. It so convenient. And I love it because I know our information is locked down and protected.”

inbayIAM (1) copy.png

Identity & Access Management (IAM)

idQ TaaS Identification & Access Management (IAM) are seamless, easy and secure. Here is an example of how idQ identifies, authenticates and authorizes the user.

Kyle is an IT admin who wants to log into a server. First, he must prove to the server that he's really Kyle. He simply takes out his mobile phone (or other Trusted Device), opens his idQ Connect app and scans the QR code on his screen. The system confirms that Kyle is who he says he is and Kyle goes to work. The quantum cryptography-based algorithm and cutting-edge security protocols enables the server to authenticate Kyle’s identity with absolute and complete certainty.

As Kyle goes about his work, he turns to the task of shutting a server down so that upgrades can be made. Before Kyle can do that, the system must confirm that Kyle has the authorization to do so. [Provisioning] Kyle’s access and what he’s allowed to do was easily set up when Kyle started and was updated after he was promoted. Through the authorization process, the system indicates that Kyle must get approval to shut down the server. 

At that point, a push notification is sent to Kyle’s boss, Dennis. Dennis retrieves an authorization request inside his idQ Connect app that says, "Kyle would like to shut down this server. Is Kyle allowed to do so?" Dennis is now able to approve or deny this transaction and Kyle can move on with the rest of his day.

Resources & Our Thinking

Data Hacks and the Problem with Passwords
Read the inBay Blog
See idQ Demo - Click here

See idQ Demo

View Now!