Arcot Deutschland GmbH
Schulweg 7 • 82343 Pöcking • Deutschland
Phone: +49 8157 99 77 93
Fax: +49 8157 99 77 94
Arcot authentication and digital signing solutions make online access safe for millions of consumer, enterprise and ecommerce users. With Arcot solutions, organizations can automatically and transparently upgrade the security of password-based authentication without changing user behavior or deploying expensive hardware. Arcot's best-in-class authentication provides protection from internet threats and bridges the gap between cost, convenience, and strength. Arcot offers fraud detection, multifactor authentication, digital signing, and ePayments authentication solutions that are delivered on-premise or on-demand as an Arcot hosted service. Arcot also provides Secure Electronic Notification and Delivery (SEND) which, for the first time, allows companies to eliminate paper processes and deliver secure electronic bills, statements and documents directly to a consumer’s email. Arcot solutions comply with U.S. and international security standards including 3-D Secure, CardSpace, FFIEC, OpenID, SAFE, and SAML.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]