Arturai uses only technical and session cookies that not request your previous consent.
For more information about the cookie collected by our website see the privacy and cookie policy here.
Accept
  • Solutions
  • Inside
  • Support
  • Contacts

    Call Us

    [1]

    Email us

    info@arturai.com

    View all
    
Free Trial

Press
Enter

  • Go to Public Sector
    How to reduce costs associated with technology infrastructure?
  • Go to Media & Entertainment
    How to maximize advertising revenue from online channels, across devices?
  • Go to Retail & Consumer Goods
    How to ensure performance across devices?
  • Go to Media & Entertainment
    How to maximize monetization revenue from games across online channels and devices?
  • Go to Travel & Tourism
    How to maximize and protect cross-channel marketing investments?
  • Go to Financial Services
    How to enable internal analysis of data for decision-making?
  • Go to Travel & Tourism
    How to extend online reservation and travel apps to mobile devices?
  • Go to Online Gaming
    How to meet gamer expectations for fast, high-quality games online?
  • Go to Retail & Consumer Goods
    How to reduce investment in site delivery and hosting infrastructure?
  • Go to Software & Technology
    How to facilitate interaction with global supply chain?

Menu

 Back
  • Solutions 
    • by Industries 
    • Tailormade Solutions
    • Web Performance Solutions
    • Cloud Security Solutions
    • Media Delivery Solutions
    • Services & Support Solutions
    • Cloudlets
    • All products
  • Inside 
    • About us
    • Partners
    • Customers
    • Job Opportunities
    • What we do 
      • Technical Advisory
      • Technological Consulting 
        • Performance Assessment
        • Security Assessment
        • Offload Assessment
        • Infrastructure Assessment
        • Download Assessment
      • Service Management
      • Business Intelligence 
        • Cloud monitor
      • Professional Services 
        • Service Management
    • Watch Akamai 
      • Real-time Visualization
    • Quality and Information Security Policy
  • Support 
    • Support Page
    • FAQ's
    • Glossary
    • Need specific help?
  • What's new 
  • Contacts

Contact Us

[1]

Email us

info@arturai.com

Follow Us

Facebook . LinkedIn . Twitter

Visit Us

Portugal . Italy . Switzerland . United Kingdom . Germany

  • Privacy and Cookie Policy
  • Sitemap

Arturai. All rights reserved.
© Copyright 2025.

Contact Us

[1]

Email us

info@arturai.com

Follow Us

Facebook . LinkedIn . Twitter

Visit Us

Portugal . Italy . Switzerland . United Kingdom . Germany


Manufacturing & Automotive

Insurance

Media & Entertainment

Online Gaming

Business Services

Public Sector

Software & Technology

Retail & Consumer Goods

Financial Services

Travel & Tourism

Healthcare & Life Sciences

Manufacturing & Automotive

Healthcare & Life Sciences

Online Gaming

Media & Entertainment

Travel & Tourism

Business Services

Financial Services

Public Sector

Software & Technology

Insurance

Retail & Consumer Goods

Home / All Products /

  • 
  • 
  • 


Login DNA

Add an extra layer of authentication while being virtually transparent to your end user

provides your organisation with AN extra layer of authentication

The rapid proliferation of consumer mobile devices is changing the traditional IT environment in the organisations, this creates security concerns.

The “work from anywhere” concept improves access to corporate applications but also creates security concerns since these access can be made from untrusted and/or compromised devices.

  • Overview
  • Objectives & highlights
  • More 

    Login DNA

    designed to add an extra layer while being simple or virtually transparent to your end user

    The rapid proliferation of consumer mobile devices is changing the traditional IT environment in the organisations, this creates security concerns. The “work from anywhere” concept improves access to corporate applications but also creates security concerns since these access can be made from untrusted and/or compromised devices.

    Username’s, which generally is the user’s email, are easy to find in today’s digital communications. Passwords are user dependent, therefore subject to brute force methods, social engineering, key-loggers and other methods. The username and password combination no longer suffices to authenticate and log into an account safely, another layer of security is needed to prevent accounts from being compromised.

    Providing another step, when authenticating a user, especially one that is not user dependent, allows for flexibility and easy deployment.

    What is Login DNA

    Login DNA provides your organisation with this extra layer of authentication without the need to enforce the strong authentication or two factor authentication, Login DNA is designed to add that extra layer while being simple or virtually transparent to your end user, but assigning each device (PC, Mobile, Tablet, etc) to a secured and restricted area in which only the combination of Username/Password/Device will allow the final user to access to any application.

    Objectives & highlights

    Objectives & highlights

    Low administrative overhead

    Requires minimum intervention by a system administrator, the process is mostly automatic and user based.

    This free’s the administrator from routine tasks and allows him to intervene to perform high level tasks such as block a user, change the acess level or respond to possible threat situations.

    Management control

    System administrator will be able to easily enable and/or disable device/browser combinations if necessary.

    Allows for a more granular level of control, by assigning to each user and/or user groups diferent ammounts of devices they can register.

    A low trust user can be given only one device/browser ( the corporate pc) while another user with a higher trust can be given more slots in which to register his devices/browsers.

    Tracking of device/browser access allows for better understanding of user preferences and usage.

    User control

    User is capable of adding and/or disabling of devices, giving them control over the process.

    Collection of login activities with data on the devices used.

    Collection of data on temporary activations of devices.

    Indirect restrictions

    Since it requires the users to follow a few steps/operations to register a device/browser, this discourages users from adding devices “ad hoc”.

    It also discourages logging in from public devices, or a friends device which will have a higher degree of exposure for malicious software such as key-loggers or other similar software.

    Overview
    Secure your Sharing Manage Big Data

    Last News

    Digitec Galaxus AG Improves the Security and the Performance of its Online Shops

    Digitec Galaxus AG Improves the Security and the Performance of its Online Shops

    Find out how Switzerland’s largest online retailer improved digital security and performance.

    View more

    Arturai is proud to announce its Akamai 2018 Commitment to Service Excellence Award winning.

    Arturai is proud to announce its Akamai 2018 Commitment to Service Excellence Award winning.

    This year Arturai was recognized in Barcelona by its Commitment to Service Excellence. This award acknowledges Arturai’s outstanding Customer Support and Services Management all over the years.

    View more

    Akamai Announces Platform Enhancements Designed To Bolster Security And Agility For Digital Businesses.

    Akamai Announces Platform Enhancements Designed To Bolster Security And Agility For Digital Businesses.

    Adds intelligent security automation, advanced threat protection for web apps, deeper real-time insights, and improved efficiencies to the edge.

    View more

    Akamai Identified As A Bot Management Leader By Independent Research Firm.

    Akamai Identified As A Bot Management Leader By Independent Research Firm.

    Report highlights that Akamai offers robust attack response, threat research and visibility; standout capabilities include threat analysis that can tie to financial loss.

    View more

    Akamai Credential Stuffing Report Shows Financial Services Industry Under Constant Attack From Automated Account Takeover Tools.

    Akamai Credential Stuffing Report Shows Financial Services Industry Under Constant Attack From Automated Account Takeover Tools.

    Latest State of the Internet / Security data reveals worldwide malicious login attempts are on the rise; report cites more than 8.3 billion detected by Akamai in recent two-month period alone.

    View more

    ARTURAI AT THE AKAMAI'S EDGE17

    ARTURAI AT THE AKAMAI'S EDGE17

    Connect to Tomorrow

    View more

    Arturai at the Akamai's Edge16

    Arturai at the Akamai's Edge16

    Bringing the future into focus in San Francisco

    View more

    State of the Internet - Security Report - Q4 2015

    State of the Internet - Security Report - Q4 2015

    The Q4 2015 report provides analysis and insight into the global cloud security threat landscape

    View more

    State of the Internet - Security Report

    State of the Internet - Security Report

    The Q3 2015 report provides analysis and insight into the global cloud security threat landscape

    View more
    Need further information or advice?
    • Visit Us

      Portugal . Italy . Switzerland . United Kingdom . Germany

    • Contact Us

      [1]

    • Email

      info@arturai.com

    • Follow Us

      Facebook . LinkedIn . Twitter

    Contact Us

    +351 220 940 519

    Email

    info@arturai.com


    Arturai. All rights reserved. © Copyright 2025   [1] National landline call costs   Complaints Book   Free Trial

    

    Send us a message

    We will answer your question as soon as possible.

    

    Request free trial

    Complete the form to start your free 60-day trial

    