Power LogOn:
Government
True MFA combined with Centralized
Password Controls for Government Credentials
Defend your agency against the weakest link in cyber security: User Managed Passwords.
Introducing
Power LogOn:
Your Complete Cyber Authentication Solution
How can Power LogOn help you?
Power LogOn Government integrates seamlessly with existing CAC/PIV/CIV credentials to streamline identity and access connected networks. By eliminating employee-managed passwords and offering advanced multi-factor authentication, Power LogOn enhances security while simplifying the login process across various federated systems including computers, networks, servers, clouds, websites, and applications.
By eliminating the need for employee-managed passwords—often the weakest link in cybersecurity—employees no longer need to know, type, generate, or manage organizational passwords. This eliminates many common attack vectors used by hackers to compromise government networks and data. Additionally, reducing reliance on employee-managed passwords leads to fewer Help Desk password resets calls.
Power LogOn Government is not a replacement of existing government certificates. It complements logon security.
Flexible and Scalable
Power LogOn supports a wide range of government credentials and technologies, ensures compliance with government standards and regulations, and offers flexible deployment options with minimal infrastructure changes.
Power LogOn doesn’t replace your digital certificate architecture, it adds additional functionality and flexibility when accessing government networks and application because not every site accepts digital certificates. With strong encryption, centralized IT control, and compatibility across platforms, Power LogOn Government is a scalable solution providing both convenience and robust protection.
Power LogOn has passed compliance review by third-party pen testers (Network
Security Inc.), cyber labs (NIST and HHS CDC), and industry leaders (InfoGard).
Secure, Automated Logins
Power LogOn streamlines access management by offering zero trust MFA architecture and automated logins across virtual portals, while enhancing both convenience and security for users. With strong encryption and administrative tools, it ensures comprehensive protections while simplifying IT management tasks, such as handling lost credentials and maintaining account security.
- Zero Trust authentication
- Works side-by-side with digital certificates
- Doesn’t replace existing credential digital certificates
- Adds flexibility to access sites that don’t accept certificates
- Adds functionality when accessing government network and applications
- Windows Bootup Logon
- Network Logon
- Inter-/Intra-/Extra-net Logon
- Windows Applications Logon
- Auto Launch Web Browser
- Auto Username & Password Fill and Submit
- Auto Launch Windows Applications
- Unlimited Accounts Stored in Active Directory
- Data Storage Encryption Integration
- Lost or Stolen Card Hotlist
- Recycle Cards and Licenses
- IT Administrator PIN Reset
- Generate Reports & Card Data Recovery
- Auto Record Internet Passwords
Zero Trust Authentication Methods
Power LogOn creates zero trust by using government cybersecurity standards, regulations, and best practices to authenticate the user, credential, computer, server, and application. This ensures mutual authentication at each step, providing enhanced security across the system.
- Possession (Something you have, i.e. credential),
- Knowledge (Something you know, i.e. PIN),
- Inherence (Something you are, i.e. fingerprint),
- Encryption Keys (embedded within the credential technology that the user cannot access or know. Works with both symmetric and asymmetric keys),
- CUID (Chip Unique Identifier), and
- Challenge/Response (mutually verifies the authenticity of a credential-to-the-system, and the system-to-the-credential)
System Requirements
Power LogOn is compatible with Windows operating systems, supports major cloud platforms, and requires minimal client computer resources, making it a highly scalable solution.
Primary Application: Identity management, multi-factor authentication, and enterprise security
Secondary Application: Strong passwords, safeguards against many hacker techniques
Operating System: Windows 11 (32/64-bit), Windows 10 (32/64-bit), and earlier versions
Servers: Win Server 2024, 2022, 2019, and earlier versions and SQL Server 2022, 2014, and earlier
Server RAM: at least 4GB for small installations, 8+GB for installation over 50 users
Virtual Server: Recommended
Client computer hard drive space: 70MB
Clouds: AWS, Azure, Google, or any private cloud supporting Virtual Machine
Web Browsers: Auto launch IE, Edge, Firefox, and Chrome browsers
Multi-Factor Authentication
According to Microsoft, MFA blocks 99.9% of attack vectors.
True multi-factor authentication (MFA) is essential for enhancing security by requiring users to verify their identity through multiple forms of validation, such as something they know (password), something they have (security token), and/or something they are (biometrics).
By adding these layers of protection, MFA greatly reduces the risk of unauthorized access, minimizing threats from compromised credentials and bolstering overall cybersecurity defenses.
Password Storage and Management
Power LogOn gives IT Managers flexible storage options for centrally managing employee passwords, without mandating specific storage locations. Crucially, no password data is stored or managed on any Access Smart server, allowing IT Managers full control over sensitive information.
You choose your storage option:
- On prem within an onsite server system
- On a third-party server
- In the cloud: Azure, Google, AWS or private cloud
IT Centralized Password Management
IT doesn’t need to “kill passwords” or follow the marketing hype of “going passwordless.” By centralizing password management, Power LogOn enables IT to force company security policies across multiple applications.
You can configure any card’s password operations to automatically align with your cybersecurity standards, while seamlessly integrating with Active Directory, LDAP, Terminal Services, remote desktops, thin clients, and VPN connections to assign specific card-based user privileges.
- Enables distributed authentication for tactical units under Degraded, Delayed, Intermittent and Limited (DDIL) conditions
- Simplifies Identity, Credential, and Access Management (ICAM)
- Provides robust Card Life Cycle Management
- Avoids the expense and complexity of digital certificates
- Seamlessly integrates with existing server and cloud infrastructure
- Enables password management via Virtual Machines (VMs) and Active Directory
- Installs on cloud platforms, enterprise servers, small business networks, or stand-alone computers
- Enhances security and reduces administrative burden through automated key management
- Scalable and adaptable for organizations of any size
Power LogOn
Government Features
Advantages and Benefits
Cybersecurity authentication goes beyond simply generating strong passwords based on length, character types, randomness, and change frequency for secure digital identity. By adopting many of the security principles used to safeguard digital certificate keys and zero trust architecture, passwords can achieve a commensurate level of security.
- Federal identity management compliant
- Compliant with FIPS 140-2 and NIST 201.
- Works with existing issued government contact or contactless CAC/PIV/CIV credentials.
- No data on the government credential is added or modified.
- No rebadging or re-certifications required.
- Employees no longer need to know, type, generate, or manage passwords.
- Secures the logs into their federal approved identity providers (IdP)
- PIN and/or biometric protection enhances security.
- Implements a work-from-anywhere architecture.
- Wrong PIN lockout prevents unauthorized access.
- Recognizes unregistered credentials to prevent misuse.
- Password Configurator ensures compliance with IT policies.
- The Password Generator prevents employees from overriding IT-configured settings.
- Passwords can be up to 500 characters in length.
- Configurable password options include upper case, lower case, numeric, and special characters.
- Passwords can be automatically changed by IT without user involvement.
- Unlimited number of accounts can be stored in LDAP directories.
- Change Password Reminder ensures timely password updates.
Security
Power LogOn enhances federated cybersecurity by using advanced encryption methods, unique usernames and passwords for each site, and non-typed passwords to guard against common cyber threats like keyloggers, social engineering, and phishing. Additionally, it provides customizable actions upon card removal and ensures encrypted password backups for secure data recovery.
- Password data is encrypted using AES-256, SHA-256, hash salting, SSL, and challenge/response for maximum security
- Self-analyzed and reviewed by USAF for STIGs compliance
- No data is added or modified to a CAC/PIV/CIV credential.
- Users don’t know or type passwords, protecting against common attack methods like social engineering, keyloggers, password sharing, and “over-the-shoulder” attacks
- Each site has a unique username and password, enhancing account security
- Card removal triggers your choice of security actions: user network log off, computer lockdown, shutdown, or custom options
- Password data backup files are encrypted
- Session key negotiation for secure communication between devices
- Account addresses are verified before autofill, guarding against spam, phishing, and pharming
- Email protections further safeguard against cyberattacks
- Password length configurable up to 500 alphanumeric characters
- PIN length configurable between 4 to 20 alphanumeric characters
Compliance
Power LogOn meets stringent federated cybersecurity standards, ensuring compliance across local, state, federal and tribal governments. Its comprehensive approach protects agencies by adhering to government-specific regulations, safeguarding sensitive data, and supporting cybersecurity requirements.
- FIPS 140-2 Verified by InfoGard
- FIPS 201 compliance by NIST– no data is added or changed on existing government credentials
- DoD STIGs compliance (U.S. Air Force reviewed)
- DFARS NIST 800-171 compliance
- NIST 800-63b AAL-3 compliance
- NIST 800-53
- CJIS compliance
- IRS 1076 Security Guidelines compliance
- HIPAA and HITECH compliance
- Insurance companies’ cybersecurity requirements
Convenience
Combining multiple functions onto a single CAC/PIV/CIV ID badge streamlines security management, making it easier to identify and address vulnerabilities quickly. Employees don’t carry multiple credentials and tokens—such as a physical access badge, a network access token, and a smartphone for SMS. With a single credential, the risk of a cyber vulnerability—the losing, misplacing, or forgetting increases with each additional device—is significantly reduced.
Power LogOn’s convenience ensures that end users follow security policies by integrating various card technologies—RFID, mag stripe, custom graphics, barcodes, and more—into a single access ID badge. This allows IT and HR to issue and manage just one credential, simplifying administration and reducing costs.
- Enhances security through secure Identity, Credential, and Access Management (ICAM)
- Streamlines security by consolidating both physical and cyber access onto a single card
- Leverages your existing CAC/PIV/CIV ID credential, simplifying integration
- In most installations, no need for re-issuance or re-badging, saving time and resources
- Enables password management with existing CAC/PIV/CIV badges, reducing the need for additional credentials
- Supports non-proprietary card compatibility for greater flexibility
- Compatible with a wide range of credential technologies, including Prox, RFID, NFC, Contact Smartcards, magnetic stripe, and more
- Reduces administrative complexity and costs while maintaining robust security standards
- Third-party software API integration
- LDAP directories supported
- Store multiple account access
- Add, view, edit, and delete cardholders
- Event logging for security and tracking records
- Supports terminal services
- Online time and attendance tracking
- Security monitoring features
- Database importing and exporting capabilities
Fast, Easy, and Affordable
Power LogOn streamlines the implementation of secure access management by utilizing existing credentials and offering flexible licensing options, making it both cost-effective and easy to deploy.
With features that enhance both user convenience and IT control, it ensures robust security without requiring additional hardware or complex infrastructure changes.
- Leverages existing physical access credentials, eliminating the need for rebadging or re-issuance
- Employees simply present their credential and enter a unique PIN, automating the logon process without typing usernames or passwords
- Provides perpetual license options for full ownership with no renewal or subscription fees
- Subscription licenses to lower annual costs based on volume and organizational needs
- No need for centralized enrollment stations, making deployment simpler and faster
- Employees can self-enroll into the system, reducing the administrative burden
- Installs in about one hour
- Works seamlessly with the same credential at the office, offsite, and at home
- Ensures data is backed up and recoverable if credentials are lost or stolen
- Temporary credentials can be issued within minutes, maintaining operational continuity
- Open architecture supports non-proprietary cards and smartcard readers
- No backend server modifications or additional hardware purchases required
- Allows users to store personal accounts without IT having access to the passwords
- Security settings are configured and locked by IT, preventing employees from altering them
- Power LogOn evaluation kit available with a 90-day money-back guarantee for thorough testing
Availability
Power LogOn is available through a network of approved GSA and SEWP contract holder resellers and distributors. If you’re interested in testing or implementing Power LogOn Government, reach out to your IT reseller. If they are not an authorized reseller, they can contact us to become one.