Use Connected by ITX to access Web sites and networks in a highly secure and user-friendly way.
IT provides a simple and fast authentication solution for any remote access, protecting from hacking and theft.
After downloading and installing it on your iPhone, you will need to register tokens in order to activate it and make it unique for you. Your service provider will provide you with appropriate registration instructions.
FEATURES:
Fast authentication using notifications
Asymmetric key protection
Secure authentication using device mechanism
Secure registration and activation.
TOTP support
Protection against wide range of attacks including:
Phishing
Man in the middle
Brute Force attack on PIN.
PIN or secrets attack by application reverse engineering or memory analysis.
PIN prediction by Differential Power Analysis.
Memory cloning.
One iPhone application for all authentication needs.
Intuitive interface.