Follow

LogMeOnce Top Security Feature Overview

LogMeOnce Top Security Feature Overview

1

Zero-Knowledge Technology

As a “zero-knowledge” technology company, LogMeOnce does not know a user’s encryption key or actual passwords. You are the only one who has absolute knowledge of your actual password and encryption key — only you can decrypt your account. Other benefits of the LogMeOnce Zero-Knowledge Technology:

  • User Exclusive Access Rights
  • Browser Exclusive Password Access
  • Device Exclusive Access Rights
 

2

PasswordLess PhotoLogin

Quote from CNET:  “What if you never had to remember another password again? Just as its name suggests, people’s passwords are protected by a picture. If you want to log into a website or an app, all you have to do is snap a photo of that same image using your computer’s webcam.

Instead of relying on a computer to figure out if the photo is accurate, LogMeOnce sends the photo to you on another device and asks if it’s OK. You say yes, and you’re in.”

Goodbye, Passwords

PasswordLess authentication uses Public and Private key pair with Private key securely protected on users vault on a mobile device.

 

3

Enjoy Multiple Login Options

LogMeOnce gives you four simple and user-friendly options. Select how you would like to log in;

   authority

   

PhotoLogin 

It's PasswordLess access by image!

 

Fingerprint 

It's PasswordLess access by fingerprint!

 

PIN Code 

It's PasswordLess access by digits!

 

Password 

You can still log in with passwords!

4

Self-destruct Photo

PhotoLogin uses each photo just ONCE, or automatically self-destructs in 60 seconds. The generated photo is digitally signed for an additional layer of security.

No more worries about duplicate passwords!

All you have to do is pose, validate yourself on your mobile device, and you are logged in. Every photo is fresh, every time! The process is easy and secure, while Two-Factor Authentication working silently in the background. PhotoLogin patented technology replaces your master password!

 

5

LogMeOnce Mugshot

Mugshot is a policy based powerful security feature that can be enabled or disabled based on your organization’s requirements.

Snap your intruder’s photo, IP address, GPS location, date & time stamp, and more. Find out who may be trying to break into your account. LogMeOnce Mugshot detects unauthorized attempt for fingerprints, passcodes, and passwords!

 

6

Selfi-2FA

The patent pending Selfi-2FA is superbly unique. Unlike traditional 2FA products that use a “one time token” and string of digits for a 2nd factor, Selfi-2FA relies on an actual image of an object.

Selfi-2FA is one of LogMeOnce’s newest Two-Factor Authentication options.

Another advantage: With Selfi-2FA you don’t have to carry around a hardware token (dongle).

Selfi-2FA ties the user’s mobile device to the authentication process. This greatly reduces the risk of bad elements gaining access to credentials or authentication tokens.

 

7

Comprehensive
Two-Factor Authentication Offerings

Add more security layers to protect your business and increase security with Two-Factor Authentication. LogMeOnce provides the richest selection of 2FA methods and protects your credentials with two layers of defense.

 
  • SMS Message
  • Voice Call
  • Email Message
  • Google Authenticator
  • Selfi-2FA
  • USB Token
  • X.509 Certificate
  • Security Questions

8

Live SSO Session Management

Track your interaction with web applications on all of your devices. At any point, you can kill all sessions with a click of a button.

For your security, you need to know the status of all your devices and active sessions at all times.

LogMeOnce provides a global map of your active sessions. It’s a real-time visual tool for managing connections to your mobile devices, computer nodes, and users on one visual display. You can see how long each session has been active and who holds the sessions. It could be you, another user on your home WiFi—or an intruder.

 

9

Mobile Device Management

Do you have device anxiety? As the owner of multiple devices—including those of your family members—you have lots of devices to track and worry about. LogMeOnce helps you know the state of your devices. Mobile Device Management (MDM) collects pertinent information including CPU, Device Identifiers, Display General Information, Network, and Software. Build a real security perimeter. You can now detect compromised devices.

 

10

Password Dialer © and Generator

Coming up with a new strong password for every account takes up a lot of time!

With the LogMeOnce Password Dialer © you save time. Simply point your finger anywhere on the circular dial, rotate, and generate a new strong password. Then simply copy and paste your new password in the right spot.

 

11

Automatic Password Changer

Even if hackers could gain access to an encrypted password, it would take at least 40 days for them to crack, by bruteforce, an 8 character password. Longer passwords would take longer. Changing your passwords every 30 days would render any bruteforced password useless.

But who has the time to change individual passwords every month!? The LogMeOnce Auto Password Changer saves users the 283 minutes (on average) it would take them to manually change 100 passwords.

 

12

Password Storage Options

And for even more peace of mind, “ONLY” LogMeOnce offers multiple options for storing your encrypted credentials. If you do not trust the cloud, then save your passwords on your own computer, and keep it with you. With LogMeOnce you have the freedom to save your data in the following places:

  • On your PC
  • In the secure cloud
  • On a secure USB
  • Amazon Cloud Service
 

13

Password Scorecard

Just how good are your passwords? LogMeOnce Security Scorecard tracks the password’s success factors in four ways: its essence, strength, daily usage and access activities.

Additionally, the report tells you exactly why your master password is (or isn’t) strong.

“It's the Identity & Security Scorecard page that holds the really valuable reports. At the top, you'll see gauges for Total Security Status, Hybrid Identity Score, Master Password Strength, and Overall Password Strength.” By PC Magazine 

 

14

Kill-Pill

Got a report of a lost or stolen device? No worries. Simply send a Kill-Pill, and you can instantly wipe off any LogMeOnce data stored on it. Access to the LogMeOnce account on the remote device will be denied.

A lost mobile device puts business apps and corporate security credentials at risk. LogMeOnce empowers companies with the ability to remotely wipe LogMeOnce account access and its data on a particular phone, ensuring that confidential corporate information does not fall into the wrong hands.

 

15

Secure Note

Securely store private information with LogMeOnce Secure Notes. It will be encrypted locally on your system. It’s like a password-protected digital notepad that you create, edit and can even color for easy distinction and search. And you may access it anywhere, anytime.

Securely save any data such as driver’s license info, credit card data, birth dates, passport numbers, bank account numbers, and Social Security numbers. LogMeOnce encrypts data locally on your computer with AES and the password that only you know.

 

16

Federated Identity

LogMeOnce’s federated identity creates a user-friendly SSO platform and securely links your organization’s multiple authentications and access policies with your systems.

We protect your existing IT investments. LogmeOnce Federated Identities integrates with a wide variety of enterprise assets, pre-integrated applications, data stores, user directories, and authentication providers.

 

17

Adaptive MFA Authentication

LogMeOnce Adaptive Multi-Factor Authentication (MFA) is a comprehensive, risk-based engine that enables IT administrators to define security policies on how to handle internal, external or partner connection requests. Policies are based on risk profiles and can trigger the need for additional authentication or provision a limited set of applications.

     

18

Directory Integration

Whether new employees and customers join your enterprise one at a time or in a clump through an acquisition, LogMeOnce Active Directory & LDAP integration reduces the laborious task of onboarding / offboarding, by eliminating migration issues and errors, reducing costs, and minimizing human involvement.

Stay lightweight or bring in multiple sets of AD connectors and servers. Easily expand access and authentication, or make it as granular as you wish.

 

19

Team Password Share

Secure information sharing and collaboration streamline and increase an organization’s effectiveness.

LogMeOnce enables you to securely share credentials with multiple Administrators or Super-Users without having to give out the passwords to corporate accounts such as Twitter or FedEx.

 

20

Productivity & Reporting

LogMeOnce scores the highest in detailed Security Reports. A big plus is that users can improve password hygiene in multiple ways, such as by generating a report that flags weak and duplicate passwords, and offers solutions to fix them. A sample of additional reports:

  • Real-time Productivity Chart
  • Dynamic Charts & Reports
  • Predefined Charts
  • Top 10 Apps Usage Report
  • Cloud Usage Report
  • Browser Usage Report
  • Top 10 IP Usage Report

  

 

 

21

Audit & Compliance

Who has access? It’s a key question for meeting compliance requirements. Do you need documentation and instant reports of authorized users adhere to your policy, or if unauthorized individuals are accessing business data, apps and resources after they have left the company?

With a single click, quickly get real-time charts, graphs, reports. Here is how others have praised our “Audit-Trail and reporting”;

PC Magazine: “LogmeOnce takes this concept to the next level. Click Reports, click Identity & Security Scorecard, and stand back; you get not one but four useful reports. Overall Password Strength corresponds to the reports from LastPass and Dashlane, with links to change weak and duplicate passwords. It also profiles your passwords based on length, character sets used, and duplications. 

 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.