Administer Callsign-protected applications for your enterprise.
Intelligence Driven Authentication™ (IDA) is designed for quick and easy deployment with minimal maintenance.
While it can be deployed with out-of-the-box mobile authenticators, our open and flexible platform also allows enterprises to plug-in existing authenticators or data sources.Register
Support for hundreds of applications and devices
An overview of a typical installation of Callsign.
The start of the user's journey - at the service provider. User types their username and clicks go.
The transaction request is processed by the Callsign Platform and is passed to the Policy Engine.
The Policy Engine checks to see if basic policy requirements (set by the service provider) are satisfied before passing back to the Callsign platform so send a request to the users device.
The users responds to the request sent to their device and provides the necessary authentication as required by the Policy Engine. A response is then sent back to the Callsign Platform along with Intelligence (Behavior, Location and Device) analytics.
The users response along with Intelligence analytics are then processed to determine if the transaction will be approved, denied or if additional authentication is required.
Callsign forwards the result to the service provider who then approves or denies the transaction.
Integrate with your favourite SaaS Apps, VPN Clients and anything else you can think of.