Power LogOn:
Commercial
True MFA combined with
Centralized Control
Defend your organization against the weakest link in cyber security: User Managed Passwords.
Introducing
Power LogOn:
Your Complete Cyber Authentication Solution
How can Power LogOn help you?
Power LogOn integrates seamlessly with existing physical access credentials to streamline identity and access management. By eliminating employee-managed passwords and offering advanced multi-factor authentication, Power LogOn enhances security while simplifying the login process across various systems including computers, networks, servers, clouds, websites, and applications.
By eliminating the need for employee-managed passwords—often the weakest link in cybersecurity—employees no longer need to know, type, generate, or manage organizational passwords. This eliminates many common attack vectors used by hackers. Additionally, reducing reliance on employee-managed passwords leads to fewer Help Desk calls for password resets.
Flexible and Scalable
Power LogOn supports a wide range of credential technologies, ensures compliance with key industry regulations, and offers flexible deployment options with minimal infrastructure changes. With strong encryption, centralized IT control, and compatibility across platforms, Power LogOn is a scalable solution providing both convenience and robust protection.
Power LogOn has passed compliance review by third-party pen testers, cyber labs, and industry leaders.
Secure, Automated Logins
Power LogOn streamlines access management by offering secure and automated logins across all virtual portals, enhancing both convenience and security for users. With strong encryption and administrative tools, it ensures comprehensive protection while simplifying IT management tasks, such as handling lost credentials and maintaining account security.
- Windows Bootup Logon
- Network Logon
- Inter-/Intra-/Extra-net Logon
- Windows Applications Logon
- Auto Launch Web Browser
- Auto Username & Password Fill and Submit
- Auto Launch Windows Applications
- Unlimited Accounts Stored in Active Directory
- Data Storage Encryption Integration
- Lost or Stolen Card Hotlist
- Recycle Cards and Licenses
- IT Administrator PIN Reset
- Generate Reports & Card Data Recovery
- Auto Record Internet Passwords
Chain of Trust Authentication Methods
Power LogOn creates a secure chain of trust by using industry standards and best practices to authenticate the user, credential, computer, server, and application. This ensures mutual authentication at each step, providing enhanced security across the system.
- Possession (Something you have, i.e. credential),
- Knowledge (Something you know, i.e. PIN),
- Inherence (Something you are, i.e. fingerprint),
- Encryption Keys (embedded within the credential technology that the user cannot access or know. Works with both symmetric and asymmetric keys),
- CUID (Chip Unique Identifier), and
- Challenge/Response (mutually verifies the authenticity of a credential-to-the-system, and the system-to-the-credential)
System Requirements
Power LogOn is compatible with Windows operating systems, supports major cloud platforms, and requires minimal client computer resources, making it a scalable solution for organizations.
Primary Application: Identity management, multi-factor authentication, and enterprise security
Secondary Application: Strong passwords, safeguards against many hacker techniques
Operating System: Windows 11 (32/64-bit), Windows 10 (32/64-bit), and earlier versions
Servers: Win Server 2024, 2022, 2019, and earlier versions and SQL Server 2022, 2014, and earlier
Server RAM: at least 4GB for small installations, 8+GB for installation over 50 users
Virtual Server: Recommended
Client computer hard drive space: 70MB
Clouds: AWS, Azure, Google, or any private cloud supporting Virtual Machine
Web Browsers: Auto launch IE, Edge, Firefox, and Chrome browsers
Secure your Virtual Front Door with:
Power LogOn
Multi-Factor Authentication
Multi-factor authentication (MFA) is essential for enhancing security by requiring users to verify their identity through multiple forms of validation, such as something they know (password), something they have (security token), and/or something they are (biometrics).
By adding these layers of protection, true MFA greatly reduces the risk of unauthorized access, minimizing threats from compromised credentials and bolstering overall cybersecurity defenses. In fact, according to Microsoft, MFA blocks 99.9% of attack vectors.
Password Storage and Management
Power LogOn gives IT Managers flexible storage options for centrally managing employee passwords, without mandating specific storage locations. Crucially, no password data is stored or managed on any Access Smart server, allowing IT Managers full control over sensitive information.
You choose your storage option:
- On prem within an onsite server system
- On a third-party server
- In the cloud: Azure, Google, AWS or private cloud
IT Centralized Password Management
IT doesn’t need to “kill passwords” or follow the marketing hype of “going passwordless.” By centralizing password management, Power LogOn enables IT to enforce company security policies across multiple applications.
You can configure any card’s password operations to automatically align with your security policies, while seamlessly integrating with Active Directory, LDAP, Terminal Services, remote desktops, thin clients, and VPN connections to assign specific card-based user privileges.
- Simplifies Identity, Credential, and Access Management (ICAM)
- Provides robust Card Life Cycle Management
- Avoids the expense and complexity of digital certificates
- Seamlessly integrates with existing server and cloud infrastructure
- Enables password management via Virtual Machines (VMs) and Active Directory
- Installs on cloud platforms, enterprise servers, small business networks, or stand-alone computers
- Enhances security and reduces administrative burden through automated key management
- Scalable and adaptable for organizations of any size
Power LogOn
Commercial Features
Advantages and Benefits
Cybersecurity authentication goes beyond simply generating strong passwords based on length, character types, randomness, and change frequency. By adopting many of the security principles used to safeguard digital certificate keys, passwords can achieve a commensurate level of security.
- Employees no longer need to know, type, generate, or manage passwords.
- PIN and/or biometric protection enhances security.
- Wrong PIN lockout prevents unauthorized access.
- Recognizes unregistered credentials to prevent misuse.
- Password Configurator ensures compliance with IT policies.
- The Password Generator prevents employees from overriding IT-configured settings.
- Passwords can be up to 500 characters in length.
- Configurable password options include upper case, lower case, numeric, and special characters.
- Passwords can be automatically changed by IT without user involvement.
- Unlimited number of accounts can be stored in LDAP directories.
- Change Password Reminder ensures timely password updates.
Security
Power LogOn enhances security by using advanced encryption methods, unique usernames and passwords for each site, and non-typed passwords to guard against common cyber threats like keyloggers, social engineering, and phishing. Additionally, it provides customizable actions upon card removal and ensures encrypted password backups for secure data recovery.
- Card storage data is encrypted using AES-256, SHA-256, hash salting, SSL, and challenge/response for maximum security
- Users don’t know or type passwords, protecting against common attack methods like social engineering, keyloggers, password sharing, and “over-the-shoulder” attacks
- Each site has a unique username and password, enhancing account security
- Card removal triggers your choice of security actions: user network log off, computer lockdown, shutdown, or custom options
- Password data backup files are encrypted
- Session key negotiation for secure communication between devices
- Account addresses are verified before autofill, guarding against spam, phishing, and pharming
- Email protections further safeguard against cyberattacks
- Password length configurable up to 500 alphanumeric characters
- PIN length configurable between 4 to 20 alphanumeric characters
Compliance
Power LogOn meets stringent security standards, ensuring compliance across government, healthcare, and financial sectors. Its comprehensive approach protects organizations by adhering to industry-specific regulations, safeguarding sensitive data, and supporting cybersecurity requirements.
- FIPS 140-2 Verified
- DFARS NIST 800-171 compliance
- NIST 800-63b AAL-3 compliance
- IRS 1076 Security Guidelines compliance
- HIPAA and HITECH compliance
- Insurance companies’ cybersecurity requirements
Convenience
Combining multiple functions onto a single ID badge streamlines security management, making it easier to identify and address vulnerabilities quickly. Employees carrying multiple credentials and tokens—such as an access ID badge, a network access token, and a smartphone for SMS—become significant cyber vulnerabilities, as the chances of losing, misplacing, or forgetting one increases with each additional device.
Power LogOn’s convenience ensures that end users follow security policies by integrating various card technologies—RFID, mag stripe, custom graphics, barcodes, and more—into a single access ID badge. This allows IT and HR to issue and manage just one credential, simplifying administration and reducing risk.
- Enhances security through secure Identity and Access Management (IAM)
- Streamlines security by consolidating both physical and cyber access onto a single card
- Leverages your existing employee physical access control ID credential, simplifying integration
- In most installations, no need for re-issuance or re-badging, saving time and resources
- Enables password management with existing physical access badges, reducing the need for additional credentials
- Supports non-proprietary card compatibility for greater flexibility
- Compatible with a wide range of credential technologies, including Prox, RFID, NFC, Contact Smartcards, magnetic stripe, and more
- Reduces administrative complexity and costs while maintaining robust security standards
- Third-party software API integration
- LDAP directories supported
- Store multiple account access
- Add, view, edit, and delete cardholders
- Event logging for security and tracking records
- Supports terminal services
- Online time and attendance tracking
- Security monitoring features
- Database importing and exporting capabilities
Fast, Easy, and Affordable
Power LogOn streamlines the implementation of secure access management by utilizing existing credentials and offering flexible licensing options, making it both cost-effective and easy to deploy.
With features that enhance both user convenience and IT control, it ensures robust security without requiring additional hardware or complex infrastructure changes.
- Leverages existing physical access credentials, eliminating the need for rebadging or re-issuance
- Employees simply present their credential and enter a unique PIN, automating the logon process without typing usernames or passwords
- Provides perpetual license options for full ownership with no renewal or subscription fees
- Subscription licenses to lower annual costs based on volume and organizational needs
- No need for centralized enrollment stations, making deployment simpler and faster
- Employees can self-enroll into the system, reducing the administrative burden
- Installs in about one hour
- Works seamlessly with the same credential at the office, offsite, and at home
- Ensures data is backed up and recoverable if credentials are lost or stolen
- Temporary credentials can be issued within minutes, maintaining operational continuity
- Open architecture supports non-proprietary cards and smartcard readers
- No backend server modifications or additional hardware purchases required
- Allows users to store personal accounts without IT having access to the passwords
- Security settings are configured and locked by IT, preventing employees from altering them
- Power LogOn evaluation kit available with a 90-day money-back guarantee for thorough testing
Availability
Power LogOn is available through a network of approved resellers and distributors. If you’re interested in testing or implementing Power LogOn, reach out to your IT reseller. If they are not an authorized reseller, they can contact us to become one.