1. Corp Add:- 8th Floor, Unit 876
Aggarwal Cyber Plaza II,
Netaji Subhash Palace , Delhi -110034, India
AuthShield security team has always been focused on innovating and creating the latest technology and so-
lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation,
Professionalism and dedication to meeting any target.
Apart from our research and development team in Two Factor Authentication, AuthShield security Team has
expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in
our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or
other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook.
Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi-
zation in the world in less than two hours!! With a multi-tenant architecture client has a centralized management
system to set up Two Factor Authentication for the entire user database. The users can easily be synced from
Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and
manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token
For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the
option of hosting the authentication server at their own premises with the same set of features.
Empanelled with DRDO Labs for multiple indigenous products.
A strong Board of Advisors consisting of former Army officers and academicians.
Only Indian company to have developed an indigenous Two Factor Authentication (Hard token,
USB Token, Image based login).
Only Indian company to have developed and deployed an independent Internet Monitoring Sys-
tem across an entire region.
Served key clients in Private and Public sector for more than four years.
Management with combined experience of more than 5000 Hours in information security.
Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor-
ing System, Multifactor Authentication.
Hard Token USB Token
ARE YOU STILL USING THE
90’s TECHNOLOGY OR
HAVE MOVED ON
TO THE LATEST
2. OTP-based authentication definitely adds
an extra step to your log-in process. How-
ever, depending on the form factor and the
vendor you chose it can be a minor incon-
venience or a major pain. Much also de-
pends on your user’s patience and your
willingness to spend the extra time to en-
sure a higher level of security. Users find
it difficult to enter OTP’s in devices.
In this scenario, AuthShield has launched
a revolutionary concept to use smart
phones as a medium for Two factor Au-
thentication. ‘One Touch Authentication’
bypass the standard One Time Passwords,
and brings a truly Two Factor Authentica-
tion experience which beats all hacking
mechanisms including ‘Key Logger’
The Solution: AuthShield One Click TM
AuthShield One-Touch Authentication is the latest innovation
in Two factor Authentication. Once a user is registered for ‘One
Touch Authentication’ he receives a Push Notification on his
smart phone every time he attempts to log in. The user just has
to ‘Approve’ or ‘Deny’ the request by a Single ‘One Touch
Authentication’ on his device to log in or reject the attempt.
One Click Authentication Architecture
Seamless integration with
Active Directory Login
Doesn’t slow you down while logging-in Doesn’t require any extra hardware tokens
Uses asymmetric cryptography to sign and verify communications
Delivered over a mutually-authenticated secure transport
An attacker can’t breach as it is based on Public-private key infrastructure
Different Token Types from AuthShield
It generates a new
password after fixed
intervals of time.
The user enters the
by the hard token as
a secondary form of
Mobile token is
factor installed on
the smart phone
itself . OTP is gener-
ated in the Smart
In SMS token
One Time Pass-
word is generat-
ed and sent to
mobile phone of
token is a con-
on the laptop /
The user enters
USB token is based
on Public Key Infra-
structure PKI Tech-
nology. It enables
the use of digital
Our Expertise in dealing with various Government Agencies
Simple and Easy Integration
Robust and Proven Technology
AuthShield Advantages AuthShield Advantages