4-FACTOR
PRODUCT DESCRIPTION
Maverick Secure LLC’s new product, Maverick 4-F™ is a breakthrough 4-factor password system. It is the most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token. It offers an enhanced authentication solution through the integration of a one-time password and well-established PKI functionality. Maverick 4-F™ generates time or event-based one-time passwords in offline mode, meanwhile providing secure storage for credentials and digital certificates when connected in a Public Key Infrastructure (PKI) environment. Maverick 4-F™ complies with the OATH standard algorithms and takes full advantage of the security with the PKI mechanism thereby keeping you, your information, and your business interests safe and secure.
- Strong four-factor authentication process
- Most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token
- All-in-one device for strong authentication, secure transaction and data protection
- Support for a wide range of authentication and access gateway solutions to protect important data
- Versatility and flexibility by combining OTP generator & encrypted memory of certificate on the same device
- DirectX support: DX11
- Open GL: v2.0
- Video Decode: UVD 2.0 – VC-1, MPEG2, MPEG4
- HDCP:v1.3b (up to 1080p)
- Side-Port Memory:128MB (DDR2-800) DP/DVI: 1080p, with Digital Audio (HDMI optional)
- Max Resolution:2560×1600 @ 32bpp (dual output capable)
- Dual Display Standard: DVI-DL + VGA, DVI-DL + DP, VGA + DP (HDMI converter optional)
- 1 – Ethernet connector (10 / 100/ 1000)
- 1 – Display Port (DP/DVI, HDMI optional)
- 1 – Display Port (DVI-DL + VGA, DVI-DL + DP, VGA + DP)
- 1 – Power Connector (12-24 volts DC @ 3.30amps)
- High security due to advanced two-factor authentication system
- Multiple operating system support
- Web-interfaced management tool for remote management
- Central authentication for networks or computer operating systems
- Provision of full configuration and management toolset
- Advanced pre-sales and after-sales services at a reasonable price
- Simple Phishing Attacks
- Real-Time Phishing Attacks
- Brute-Force Attacks
- Chosen-Plaintext Attacks
- Replay Attacks
- Shoulder Surfing and Snooping