The Callsign Platform allows you to embed military-grade security into your applications and services within minutes. It has been designed for quick and easy deployment with minimal maintenance. Deployment consists of three main tasks.
Any service can be protected using Callsign within minutes, by selecting an appropriate Connector type then integrating or configuring. Sample integrations and configurations are provided to help you get going.
As part of the deployment process users must also be onboarded, this can be achieved in a fully self service manner through the app or via the Onboarding Portal which can be styled according to your brand.
Policies can be set to restrict access based upon time, location, behavior and device integrity. This can be applied on a fine-grained basis, such as on a login attempt or when a certain threshold has been passed.
An overview of a typical installation of Callsign.
The start of the user's journey - at the service provider. User types their username and clicks go.
The transaction request is processed by the Callsign Platform and is passed to the Policy Engine.
INITIAL POLICY CHECK
The Policy Engine checks to see if basic policy requirements (set by the service provider) are satisfied before passing back to the Callsign platform so send a request to the users device.
INTELLIGENCE & AUTHENTICATION
The users responds to the request sent to their device and provides the necessary authentication as required by the Policy Engine. A response is then sent back to the Callsign Platform along with Intelligence (Behavior, Location and Device) analytics.
FOLLOW UP POLICY CHECK
The users response along with Intelligence analytics are then processed to determine if the transaction will be approved, denied or if additional authentication is required.
Callsign forwards the result to the service provider who then approves or denies the transaction.
Integrate Callsign with everything
Integrate with your favourite SaaS Apps, VPN Clients and anything else you can think of.