The 4th factor. 

Physical location authentication.

 

Where you are along with who you are determines what you can do.

 
 
WC_Sentinel-01.png

The core of our technology. 

Sentinel™, an embeddable SDK that strengthens your authentication policies to a level never experienced before

Sentinel™ is as sure of where you are as fingerprints are as sure of who you are.

 

Our proprietary algorithms compare inputs from various sensors on a mobile device to detect erroneous or fake sources of location, assuring access, data and functionality is not executed in the wrong location.

Sentinel™ prompts the device and user to preform specific actions which confirm the precise location of both. These actions are triggered based upon the rules, permissions and physical space that you wish to provide access within.

Sentinel™ seamlessly connects laptops, desktops to authenticated devices and 

Sentinel's spatial recognition capability is fully functional off-line or connected to the WHITECYBER cloud.

Along with the location determination features of Sentinel, our process manager minimizes battery drain, controls background processing, cache functions and predictability of use.

data (1).png
data%20(1)_edited.png
scanner_edited.png
video_edited.png
responsive-design_edited.png
Sentinel™
Cloud
Sentinel™
Connect
Sentinel™
Desktop
Sentinel™
Capture

Library & Caching of survey resources.

Survey of new space and verification of authenticated space either embedded within your UEM or as a stand-alone application.

Oversight of spatial enrollment remotely through any video conference platform.

Protects sensitive data on computer by linking to a Sentinel™ enabled device.

 

Location Authentication.

Authenticate  space.

Authorize  access.

Location authentication is more than another factor in the process. When the physical space is authenticated you then control the space. 

Once authenticated, the location becomes functional on multiple levels. 

1). As part of your MFA, Sentinel™ elevates authentication confidence to levels not available before.

2). Device functionality can be controlled by authenticated location.

3). Data access can be controlled by authenticated locations.

4). Remote user access can be controlled by location.

5). Simple process to pair multiple devices within a authenticated location.

 

Use Cases

Working from Home

Remote Workforce

Strengthen security and access controls by authenticating the remote physical space of the employee.

 

Be in Touch

We want to hear from you!

info@whitecyber.com

Thanks for submitting!