To de-risk access from common and sophisticated social engineering, or MitM attacks, access security must provide TLS-level authentication binding.
This means relying on a protocol that doesn’t leave systematic gaps for hackers and adversaries to exploit. Peig can do this on regular devices in the background without users being bothered by cumbersome security heckles.
Peig is a browser app which employee’s and contractors to securely access an organization’s web resources.
Peig is used to access these resources via existing web applications your organization already uses.
Peig server is Peig app’s security counterpart. Together with the Peig app, the Peig server makes sure all access is securely autheticated to get rid of phishing threats.
Peig browser client establishes a standard web session with a web application using HTTPS. This is great for encryption purposes, but it doesn't verify whether the user has accessed the real web application or has been phished. Similarly, the web application can't recognize a real user from an imposter MitM server.
To mutually authenticate a user’s device and a web application reliably, we need a challenge-response handshake, binding a challenge to the HTTPS session channel using our cryptographic keys.
The challenged has been bound to the used HTTPS session and is ready to be authenticated.
The Peig browser client and the Peig workspace server & mutually authenticate each other using the challenge in the process.
Thanks to using heavy-duty authentication keys and the binding process, there is high confidence that the right user is accessing the right web application using their deviceactin.
We have successfully authenticated the user's Peig, the web application, and, most importantly, the session channel to architectural mitigate phishing & MitM!
Please understand we will share our case study with you only in exchange of your contact. If you don’t mind, leave us your email. As we’re security masters, believe your data won’t be misused.
Team Peig
Giving us your email, you agree with our policy and A wonderful serenity has taken possession of my entire soul, like these.
Please understand we will share our case study with you only in exchange of your contact. If you don’t mind, leave us your email. As we’re security masters, believe your data won’t be misused.
Team Peig
Giving us your email, you agree with our policy and A wonderful serenity has taken possession of my entire soul, like these.