GridGuard Overview

SyferLock’s patented, software-based two-factor / multi-factor authentication solutions provide next generation One-Time Passwords/PINs (OTPs) for secure access to computers, networks and the Internet.  SyferLock has engineered an enhanced authentication methodology and system using device-less OTPs that provide users with a simple, more secure way to access information leveraging their existing passwords.

SyferLock delivers unparalleled flexibility through a range of solutions to address diverse and evolving authentication needs.  Our zero footprint aspect provides device-less, One-Time Password/PIN generation without any additional client-side hardware or software, and without any dependency on a cell phone like SMS text-based solutions.  SyferLock’s methodology also allows the creation of a layered approach to current authentication processes: stand alone, or used in conjunction with other factors.

SyferLock's two-factor and multi-factor authentication solutions enable enterprises and organizations to comply with authentication mandates imposed by HIPAA, CJIS, FedRAMP, FERC, PCI, SOX, FFIEC, BASEL, and GDPR, among others.

Utilizing SyferLock’s Software-Based Authentication Solutions to Cover the Authentication Spectrum

At one end of the authentication spectrum you have commonly used static reusable passwords. At the other end of the spectrum you have two-factor authentication. No single authentication solution seems to be flexible enough, adaptable enough and secure enough to help with ever changing business cases and user needs until now. SyferLock has created one of the most flexible, adaptable and secure authentication solutions to enable enterprises to cost-effectively address two-factor authentication / multi-factor authentication across a range of uses cases.

SyferLock’s two-factor and multi-factor authentication solutions eliminate or mitigate a range of attacks, including:
  • Key-Logging
  • Replay
  • Shoulder Surfing
  • Automated Attacks
  • Brute Force & Dictionary
  • Sniffing
  • Interception
  • Stored Browser Passwords
  • Cross Site Scripting
  • Man-in-the-Middle