MENTIS

Solution Authentication







authentication and authorization
 

Because passwords aren't enough.

unauthorized access accounts for 45% of security incidents


 

iverify
2 factor authentication

The weakest link in security is the password. iVerify’s two-factor authentication (2FA) requires two types of credentials to authenticate user identity before allowing access to systems. Our independent token generation is not dependent upon connections, bringing additional strength.

iprotect
user access authorisation

Implement robust user controls to prevent unauthorized access to your Production database. Assign and manage access for new users. Control user access with customizable levels of access. Authorize the program, terminal, and time of day that access is allowed for each user.

Improve security with minimal performance impact

With over a billion passwords (and counting) compromised, defending against credentials-stuffing attacks should be mandatory.

Your security is only as good as its weakest link, and credentials-based access is that weakest link.

MENTIS’ authentication and authorization solutions allow you to take a pro-active approach to preventing unauthorized access to your sensitive data. First, verify users by adding a second, more secure layer to the login process; second, block access based on risk with custom restrictions that you assign, such as time of day, workstation, or geographic location, among others.

MENTIS provides the tools to reduce this common risk without compromising your ability to have the data access your organization needs. Take care of business.

MENTIS. We’ve got your back.

Request a demo

MENTIS Advantages


 

COmprehensive

A complete data and application security that covers discovery, anonymization, monitoring, and retirement of personal data.

 

Auditable

A complete audit log of all activities from discovery to the retirement of personal data, downloadable in Excel and other formats.

 

INTEGRATED

A single integrated platform that covers all key data sources such as structured, unstructured, big data and cloud.

RESOURCES


SENSITIVE DATA

iDiscover locates ALL sensitive data with minimal false positives.

CASE STUDY - FORTUNE 15 COMPANY

MENTIS helped a fortune 15 global conglomerate to find sensitive data across PeopleSoft, SAP applications

CASE STUDY - LARGEST PRIVATE BANK IN DR

MENTIS helped the largest private bank in Dominican Republic to find all sensitive data in DB2 and Oracle databases

SENSITIVE DATA DISCOVERY

iDiscover locates ALL sensitive data with minimal false positives.

CONTINUOUS MONITORING

iMonitor watches user activity on sensitive data, with breach notification capabilities.

SENSITIVE DATA RETIREMENT

MENTIS helps you comply with subject data rights like “Right to be Forgotten.”