Our technology has been developed through a rigorous security design process. The end result is a secure and flexible system which can be seamlessly integrated into today's enterprise cloud infrastructure.
Hoverkey enables strong authentication through the use of hardware security keys. For maximum user convenience, we support different form factors including USB keys, contactless security cards, and hardware security chips embedded in mobile devices.
Hoverkey stores encrypted resource authorisations in the cloud, rather than on the hardware security key. This minimises hardware requirements and cost.
Users are required to authenticate on their device (laptop or smartphone) or on a separate hardware security token, and the user authentication is verified on the token before any unlock response is sent.