Rigorous security design

Our technology has been developed through a rigorous security design process. The end result is a secure and flexible system which can be seamlessly integrated into today's enterprise cloud infrastructure.

USB and contactless

Hoverkey enables strong authentication through the use of hardware security keys. For maximum user convenience, we support different form factors including USB keys, contactless security cards, and hardware security chips embedded in mobile devices.

Cloud storage

Hoverkey stores encrypted resource authorisations in the cloud, rather than on the hardware security key. This minimises hardware requirements and cost.

2 factor authentication

Users are required to authenticate on their device (laptop or smartphone) or on a separate hardware security token, and the user authentication is verified on the token before any unlock response is sent.

All rights reserved. Hoverkey Ltd.

© 2021