The exclusive artificial intelligence of kydom allows you to define and certify geolocations without GPS, through the analysis of geolocation radio waves.
The communication channel is completely separate from the channel used to transmit the data. This makes hackers have to compromise various devices and networks to compromise authentication.
Authentication occurs from a secret location, only known to the user. By using radio signals to certify the location of each user, it is avoided that any remote attacker is able to impersonate their identity, since to know the lines it is necessary to have physical access to the place.
The signals used for authentication on the server are not saved on any server. To do this, the algorithm will be trained, eliminating the signals and saving only the algorithm, storing it in a mathematical black box that is activated only with a certain input. In this way, the data leaks that have ended the password are finished.
A completely separate device is used to perform the authentication so that, although the computer is checked with malware to steal the access credentials. This procedure prevents Trojans and other malware from stealing access credentials.
KYDOM for App Authentication
Hire the first and only authentication service that allows you
to use a secret lair as password to your most critical, private or confidential
In addition, you can easily integrate our MFA with the protocols < b> SAML , OpenID Connect , or even, with a custom integration with our sdk.
KYDOM for Remote Access
The VPN that allows quick and instant access to your
providers. Do not let your VPN depend on a simple password, or a hard-to-install hardware USB.
Allow access to your data , using only a phone number and let your customers define a secret lair from which to access.
KYDOM for Physical Access Control
Control the physical access to your office, without the need for any type of hardwares (lathes, tracks) with a high cost and complex facilities. With our technology, you will be able to identify who accesses or leaves any place you wish to control. Kydom will issue an alert that warns if someone has violated one of your secret lairs.
Head of cyber defense Iberia & Israel - Accenture
Disruptive security solutions for new enviorements and scenarios, ICS, SCADA, IoT, industrial, etc.
Jose Ramon Polanco
VP Threat Intelligence at ElevenPaths
IronChip guys are really talented and focused on designing disruptive solutions in the cybersecurity field. Eventually, they will find the perfect VC to achieve their goals in the best conditions.
Director of the EMBA at the University of Deusto
ironchip is a very disruptive company, looking for new challenges and trying to make a different world. As profesor of University of Deusto I have come across their products and solutions in different occasions and we have had the opportunity to us them in our academic sessions.
Pedro Muñoz Baroja
Managing Partner en Easo Ventures SCR
Jose and Julen are very active entrepeneurs, always ready to adapt their high technological capabilities to the market needs.
Password protection is dead.
A project with great practical potential to prevent attacks in real time in the field of banking security.
Contact us for more information
Avenida altos hornos de Bizkaia, 33 (Edificio ilgner), Barakaldo, Spain
946 03 94 99