Intuitive Access Management

Start with importing your users from one or all of your directories (e.g. Active Directory or LDAP). Managing your users’ access gets easier through the NoPassword Dashboard. It takes three clicks to add a new user. It only takes one click to suspend their access or remove the user.

Two-way, Multi-directory, Real-time Sync

Initially, when you sync your directory, all your users settings, including security groups and organization units, are imported to the NoPassword Dashboard. It gives you an overview of your organization’s access setting and allows you to customize it as you require. NoPassword syncs with your original directory in real time. All changes in the NoPassword directory automatically syncs with your main directory and visa versa.

User Provisioning for the Modern World

Automating user provisioning boosts security. In today’s workplace, employees from different departments need to gain access to different applications, from different locations, at different times. Manually managing and provisioning users’ access is not only impractical but also an insecure practice. NoPassword automates your provisioning and deprovisioning process to save IT professional time and resources, while enhancing security.

Application Access Management

In every organization, it’s important to manage, monitor, and supervise who has access to what information and which applications. NoPassword, while pre-integrated with thousands of applications, can integrate with your customized or legacy application. Simply choose the application that your users use and the integration is done with a few clicks of the mouse.

Geo-fencing and Access Management

With over 90% of cyber attacks triggered from outside the country and almost all of them from outside business premises, geo-fencing significantly improves security. Simply limit your users’ access to your country, state, city, or your building. Define as many green zones or regions, and assign them to different users or group of users to limit their access to those zones or regions.

Customized Security Policies

NoPassword allows IT professionals to define customized permanent or temporary security policies for all or a selection of users. Simply define geo-location, time and/or IP based policies and assign them to a user or group of users. Temporary policies can be defined for a certain period of time, for instance, those users who are traveling or telecommute can be assigned a temporary policy that allows them to gain access to their accounts from their destination or the location they are temporary based.

Authentication Device Management

NoPassword Dashboard allows admins to monitor and supervise what type of  devices are used by their users and enforce adequate methods of authentication. It also allows admins to enforce authentication policies, such as certain permitted number of authentication attempts and how long to lock the phone if the user fails to get authenticated. It enables the admins to unlock or lock any user’s phone to suspend user’s access temporary.

Intuitive Access Management

Data analytics is a useful tool to improve security.  Real-time reports, including valuable information about users’ access, helps improve security and prevent cyber attacks. NoPassword fraud detection and risk assessment machine learning algorithm analyzes this data and reports to the admin regularly.

Users’ Log Audit

The audit tools gives IT professionals a new vision to see what’s going on in their network. With the NoPassword Dashboard, IT admins can they see who has problems accessing to their account, unauthorized access requests, suspicious activity, access request from outside geo-fence, and a lot more. All this information gives a great insight and allows them to not only protect but also prevent future threat.

NoPassword Geo-fencing

Admins’ Log Audit

NoPassword log audit tool is not limited to users. IT supervisors can also monitor admins’ actions to prevent any human error. This tool is highly requested by large organizations that have multi-admin branches with different levels of access. Monitoring and supervising admins’ actions provides further insight to improve their security and facilitate IT tasks, productively and securely.