โThe strategy of the BaroPAM solution is to strengthen the security of information assets and minimize user inconvenience!โ
The BaroPAM solution is a zero trust security model and is based on the Pluggable Authentication Module (PAM) method that anyone can easily apply to various operating systems and applications that require secondary authentication (additional authentication) to strengthen the security of information assets. It is a solution that supports multi-layer security level authentication optimized for security.
The BaroPAM solution is a zero-trust security model. It is a 3-step authentication solution using module authentication biometrics that does not require a separate authentication server. It is highly secure, simple, requires no management, has no problems, and can be easily applied by anyone immediately. It is a low-cost, highly efficient solution that does not require the introduction of additional servers or DBs when introducing the solution.
Passwords are never safe, and now you need to replace your password or perform secondary authentication (additional authentication) every time you access the server.
โฃ BaroPAM Features
โถSupports secondary authentication using a module authentication method that does not require a separate authentication server
โถGuaranteed service with fast authentication speed (average authentication time within 0.01 seconds)
โถProvides simple convenience by using smartphones, etc. as an authentication key generation medium
โถProvides app lock on/off function to prevent authentication information from being exposed when the smartphone is lost
โถiOS provides a function that allows self-authentication
โถAuthentication possible even in frequently occurring communication failures or secure areas
โถBiometric authentication (fingerprint recognition, face recognition) function provided when running the BaroPAM app
โถEven if the authentication information is forged or altered during the authentication process, bypass authentication is not possible.
โถStarting from a simple (loose) configuration, it can evolve into a more complex (robust) security system.
โถProvides BaroPAM app source obfuscation and screen capture prevention functions
โถIndividual grant of one-time authentication key and generation cycle for each information asset/account
โถEmergency one-time authentication key provided when smartphone is not available
โถUse of the globally recognized 512Bit standard Hash function (HMac-SHA512 / Internet security standard IETF RFC 6238)
โถSupports Time-Sync and dynamic HMac Key methods recommended by the Financial Supervisory Service
โถDynamic security such as one-time/volatile that changes every time or is used once and then discarded
โถ Authentication bypass (bypass techniques, fatigue attacks, etc.) and MFA fatigue attacks are impossible.
โถLogin is not possible even if account information is stolen by abusing the automatic login function.
โถApplicable to all fields that require secondary authentication, such as various information assets (PAM/SQL/HTTP authentication is also supported during RADIUS authentication of information assets)
โถProvides the ability to set the number of authentication limits and time limit (e.g., 3 times in 30 seconds)
โถProvides a function to prevent man-in-the-middle attacks
โถProvides ACL function for accounts that can be allowed/excluded from secondary authentication
โถProvides free customization and linked development with various applications (API linkage such as Java, C, C++, etc.)
โIf you donโt do anything, youโll get halfwayโ is an old saying, and it doesnโt apply in the cloud era. With a new era comes a new protective device. Systems and infrastructure are constantly being replaced with new ones, but it is time for each of us to examine ourselves as to why we are holding on to the old ones.
The conclusion is not whether โsecondary authentication was introduced,โ but rather โwhat kind of secondary authentication was introduced,โ including technology and security.
โTrust nothingโ = โTrust no oneโ = โKeep verifyingโ
The future trend of information security will be to strengthen security and minimize user inconvenience. Passwords that do not need to be remembered! BaroPAM will be with you.
Consultation inquiry mc529@nurit.co.kr