Single sign-on

July 2007 Information Security

As computers are getting increasingly mobile and better connected, threats to data security are increasing in number as well as complexity.

Business customers, for whom data security can have a direct impact on the health of their business, are becoming increasingly concerned. Bioscrypt understands that security needs must be addressed holistically.

VeriSoft is a client-server based enterprise single sign-on/network logon solution with robust multifactor authentication capabilities including world leading support for fingerprint biometrics.

The application provides the following functionality:

Secure desktop logon

VeriSoft supports logon to Windows using multifactor authentication including any combination of fingerprint biometrics, smartcard, contactless and proximity smartcards, as well as password. A centralised policy determines the user's required credentials. With VeriSoft Access Manager Server, administrators can create a unique security policy that requires their chosen authentication method, including alternatives to passwords when logging on to Microsoft Windows.

Multifactor authentication

VeriSoft supports multifactor user authentication, including fingerprint biometrics, user passwords, smartcards, proximity cards and virtual tokens. This robust feature allows for multiple authentication methods to be used in any combination when assigning access privileges to applications and services.

Enterprise single sign-on

VeriSoft Single Sign On stores usernames and passwords for multiple applications and automatically enters logon credentials when a registered application is accessed. Users no longer have to memorise the growing number of passwords for Web-based and Microsoft Windows applications. VeriSoft is essentially a user identity vault that makes accessing protected applications more secure and convenient.

Automated password management

Password generation can be completed behind the scenes and is transparent to end-users. The result is a highly secure and easy-to-use identity and access management solution designed to authenticate users quickly and efficiently while securing sensitive organisational data.

Key reference customers

Bioscrypt has licensed the VeriSoft to several OEM partners. As one example the VeriSoft technology is deployed as Credentials Manager for ProtectTools by HP with every commercial HP Notebook, selected HP Consumer notebooks and other OEM customers. Through these relationships, the VeriSoft is now in use by more than 6 million people worldwide.

For more information contact Nichola Allan, G2 Security, +27 (0)11 462 5700, [email protected].



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...