Your information, and your business interests safe and secure

4-FACTOR

Maverick Secure LLC’s new product, Maverick 4-F™ is a breakthrough 4-factor password system. It is the most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token. It offers an enhanced authentication solution through the integration of a one-time password and well-established PKI functionality. Maverick 4-F™ generates time or event-based one-time passwords in offline mode, meanwhile providing secure storage for credentials and digital certificates when connected in a Public Key Infrastructure (PKI) environment. Maverick 4-F™ complies with the OATH standard algorithms and takes full advantage of the security with the PKI mechanism thereby keeping you, your information, and your business interests safe and secure.

KEY FEATURES

  • Strong four-factor authentication process
  • Most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token
  • All-in-one device for strong authentication, secure transaction and data protection
  • Support for a wide range of authentication and access gateway solutions to protect important data
  • Versatility and flexibility by combining OTP generator & encrypted memory of certificate on the same device
  • DirectX support: DX11
  • Open GL: v2.0
  • Video Decode: UVD 2.0 – VC-1, MPEG2, MPEG4
  • HDCP:v1.3b (up to 1080p)
  • Side-Port Memory:128MB (DDR2-800) DP/DVI: 1080p, with Digital Audio (HDMI optional)
  • Max Resolution:2560×1600 @ 32bpp (dual output capable)
  • Dual Display Standard: DVI-DL + VGA, DVI-DL + DP, VGA + DP (HDMI converter optional)

External Connectors:

  • 1 – Ethernet connector (10 / 100/ 1000)
  • 1 – Display Port (DP/DVI, HDMI optional)
  • 1 – Display Port (DVI-DL + VGA, DVI-DL + DP, VGA + DP)
  • 1 – Power Connector (12-24 volts DC @ 3.30amps)

BENEFITS

  • High security due to advanced two-factor authentication system
  • Multiple operating system support
  • Web-interfaced management tool for remote management
  • Central authentication for networks or computer operating systems
  • Provision of full configuration and management toolset
  • Advanced pre-sales and after-sales services at a reasonable price

PROTECTS YOU AGAINST

  • Simple Phishing Attacks
  • Real-Time Phishing Attacks
  • Brute-Force Attacks
  • Chosen-Plaintext Attacks
  • Replay Attacks
  • Shoulder Surfing and Snooping