www.comarch.com
Open in
urlscan Pro
91.227.213.212
Public Scan
Submitted URL: http://tpro.comarch.com/
Effective URL: https://www.comarch.com/cyber-security/adaptive-authentication-suite/tpro/
Submission: On October 31 via api from US — Scanned from PL
Effective URL: https://www.comarch.com/cyber-security/adaptive-authentication-suite/tpro/
Submission: On October 31 via api from US — Scanned from PL
Form analysis
1 forms found in the DOMGET /search
<form action="/search" method="get" class="search__form">
<div class="search__form-controls-wrapper">
<i class="search__icon-close search__icon-close--left"></i>
<div class="form__fieldset form__fieldset--default search__input-wrapper">
<div class="form__control-wrap">
<div class="form__helper">
<input type="text" placeholder="Phrase" name="phrase" class="form__control search__input" maxlength="120">
</div>
</div>
</div>
<div class="form__fieldset form__fieldset--default search__section-control-wrapper">
<div class="form__helper form__helper--inline form__helper--single-select">
<select class="form__control search__section-control" name="section" data-hide-search="true" style="display: none;">
<option value="">All categories</option>
<option value="1">Other</option>
<option value="2">Telecomunications</option>
<option value="3">Finance</option>
<option value="4">ERP</option>
<option value="5">Large enterprises</option>
<option value="6">Government</option>
<option value="8">TV</option>
<option value="9">Career</option>
<option value="10">Investors</option>
<option value="11">News and Events</option>
<option value="12">Healthcare</option>
<option value="13">Training</option>
<option value="14">Field Service Management</option>
<option value="15">Data Exchange</option>
<option value="16">Customer Experience & Loyalty</option>
<option value="17">ICT & Data Center</option>
</select>
<div class="chosen-container chosen-container-single chosen-container-single-nosearch" title="" style="width: auto;"><a class="chosen-single" role="button">
<span>All categories</span>
<div><b></b></div>
</a>
<div class="chosen-drop">
<div class="chosen-search">
<input class="chosen-search-input" type="text" autocomplete="off" readonly="">
</div>
<ul class="chosen-results"></ul>
</div>
</div>
</div>
</div>
<button type="submit" class="search__submit-btn">
<i class="interface-icon interface-icon-interface_search"></i>
</button>
</div>
<i class="search__icon-close search__icon-close--right"></i>
</form>
Text Content
Main menu * Cyber Security * Industries Industries * Finance, Banking and Insurance * Telecommunications * Healthcare * Small and medium-sized enterprises * Loyalty Management * Cyber Security products Cyber Security products See Cyber Security products * tPro Solutions tPro Solutions See tPro Solutions * Comarch tPro ECC * Comarch tPro Mobile * Identity & Access Management * Comarch Smooth Authentication * Conferences * News * Blog * Contact * Language EN (English) Language * PL (Polski) * EN (English) * DE (Deutsch) * FR (Français) * BE (Français, Dutch, English) * NL (Dutch) * IT (Italiano) * ES (Español) * PT (Português) * RU (Pусский) * JP (日本語) COMARCH Cyber Security * Products * tPro Solutions * Comarch tPro ECC * Comarch tPro Mobile * PSD-2 * Identity & Access Management * Comarch Smooth Authentication * Industries * Finance, Banking and Insurance * Telecommunications * Healthcare * Small and medium-sized enterprises * Loyalty Management * Blog * Insights PL EN DE FR BE NL IT ES PT RU JP EN Contact All categoriesOtherTelecomunicationsFinanceERPLarge enterprisesGovernmentTVCareerInvestorsNews and EventsHealthcareTrainingField Service ManagementData ExchangeCustomer Experience & LoyaltyICT & Data Center All categories * Comarch * Cyber Security * Comarch Adaptive Authentication Suite * Comarch Transaction Protection YOUR PRIVACY On the GK Comarch websites, both we and our partners use cookie files and targeting. Cookie files (a.k.a. "cookies") are small text files sent to your browser by the site you visit at any given time. They are used for analytical and statistical purposes as well as to ensure the proper functioning of the site. Additionally, they are used to tailor marketing content to the interests of users visiting our sites. As we respect your privacy, we ask for your consent to use these technologies. You can consent to cookies by clicking "Accept all". If you want to personalize your choices, click "Settings." You can withdraw your previous consent or change your preferences at any time by clicking the "Settings" button. Using cookies for the purposes indicated above is related to the processing of your personal data. The administrator of your data is Comarch SA. In some cases, our partners may also be the administrators of your data. For more information on how we and our partners use cookies and process your personal data, please see our Data Processing Notice and Cookie Policy. Accept all Details TRANSACTION PROTECTION SOFTWARE * Comarch Transaction Protection Protect your customers from fraud transactions and save on operating costs Contact us * Comarch Transaction Protection Protect your customers from fraud transactions and save on operating costs Contact us * Comarch Transaction Protection Protect your customers from fraud transactions and save on operating costs Contact us Cyber Security software * tPro Mobile Demo Test our tPro Mobile application Request a demo * Request for contact Request a demo or contact our expert Contact us PAYMENT PROTECTION WITH TPRO Looking for a cost-effective solution to secure your customers’ logins and transactions? Comarch Transaction Protection (tPro) is what your company needs! Designed for banks and other financial institutions, the tPro suite consists of two innovative solutions for strong customer authentication and transaction authorization: tPro ECC and tPro Mobile. The first element of the platform is the Comarch tPro ECC solution - a professional hardware cryptographic token, equipped with a proprietary button, the pressing of which initiates the authentication or authorization process. The whole solution is contained in a compact casing the size of a flash drive and connected to the workstation via a USB port. The second solution is Comarch tPro Mobile - a modern application token, enabling not only secure authorization or authentication, but also allowing for the integration of cryptographic tokens of various applications in one place. By loading the video, you accept Comarch Cookie Policy. Learn more Load the video The tPro platform uses advanced technology, strongly focused on cyber security. Both the elliptical curve cryptography (ECC) and the adopted architectural solutions used provide protection against multiple attack vectors, such as password stealing, identity theft or man-in-the-middle/browser attacks. The tPro solution family can be used for a variety of purposes. The most intuitive and popular use cases for tPro are: * strong customer authentication, including PUSH messages, * protection of bank transactions and payments through secure authorization, in accordance with the recommendations of the PSD2 Directive, * verification of operation details in accordance with the WYSIWYS paradigm (tPro Mobile solution) KEY BUSINESS ADVANTAGES Enhanced security Proactive security features designed to increase customer protection during login and transaction authorization Lower costs Driverless approach providing full OS and browser coverage without the installation of any additional hardware, software or middleware to buy, deploy and maintain End-to-end solution Possibility of integration with the tPro Authentication Server, a module of Comarch Identity and Access Management (IAM) expandable with additional features Dynamic flexibility Full control over R&D and production allowing for easy customization of both hardware and software in response to different market demands COMARCH REMOTE WORKING SOFTWARE Comarch tPro Mobile is more than just a 2 Factor Authentication (2FA) tool. There are also other applications for the tPro family which, especially during the period of widespread remote working, can be used extensively. It ensures a secure VPN connection and supports remote work. The geolocation feature lets you verify where your employees are. You can also sign documents remotely. All that with the highest level of security available. One such solution is to use tPro Mobile as a VPN (Virtual Private Network) authentication token. As the tPro platform is based on strong encryption of transmitted messages, it can be effectively used as an authentication tool, integrated with network devices, to implement VPNs. With this solution, the access to corporate resources is secure and the user identities are protected from attacks. The offered solution is also convenient and user-friendly. This is ensured not only by a friendly interface, the use of biometrics or PUSH technology, but also by a simple onboarding process based on QR codes. The conducted stress-tests have shown that the solution effectively carries out VPN authentication based on OTP codes (HOTP, TOTP), ensuring the efficiency at a minimum of 50 queries per second. Another possible application of the tPro platform is the determination of user geolocation. This is done on the basis of coordinates from the GPS and network IP. The verification of a user's geographical location may be necessary to ensure their security: to be able to protect a person, it is necessary to be sure of their physical location. Geolocation can also be used to protect classified information. Based on local legislation or the security policy of the company, it may be prohibited to use specific data outside the company's headquarters or outside a certain area (e.g. abroad). Locating a user outside the nominal access area may result in the denial or restriction of access to specific data. Another feature of the tPro product family is the massive online signing of PDF documents. For all companies and institutions that send electronic documents en masse, the key issue is their reliability. Signing documents sent in bulk (such as invoices or business contracts) should provide a security guarantee that both the sender and recipient have no doubt that the integrity of the message has been fully preserved. Moreover, the sending process itself should be fast and secure. All this is offered by tPro in a service called Document Signer. The solution allows you to sign hundreds of PDF documents in a second. At the same time, it uses electronic seal technology to sign PDF documents in PAdES format to confirm that a particular document has been sent by a particular company. Read more about Comarch software for remote work Comarch Cyber Security clients * * * * * * * * * KEY BUSINESS ADVANTAGES * Enhanced security Proactive security features designed to increase customer protection during login and transaction authorization * Lower costs Driverless approach providing full OS and browser coverage without the installation of any additional hardware, software or middleware to buy, deploy and maintain * End-to-end solution Possibility of integration with the tPro Authentication Server, a module of Comarch Identity and Access Management (IAM) expandable with additional features * Dynamic flexibility Full control over R&D and production allowing for easy customization of both hardware and software in response to different market demands COMARCH TRANSACTION PROTECTION SOLUTIONS tPro ECC tPro Mobile * 1 * 2 tPro ECC Find out more tPro Mobile Find out more PSD-2 Find out more Comarch Cyber Security By loading the video, you accept Comarch Cookie Policy. Learn more Load the video COMARCH ON VIRTUAL NON-FINANCIAL RISK SUMMIT Watch Comarch presentation on Virtual Non-Financial Risk Summit 2020 and learn more about mobile security measures to protect against fraudulent activity on smartphones and desktops. Watch now (ISC)2 webinar Did you know that your mobile might be used as a security tool? Hear our (ISC)2 webinar recorded by Comarch experts and find out how to make authentication mechanisms easier & more efficient. Download now! COMARCH TRANSACTION PROTECTION FAMILY * tPro ECC * tPro Mobile * PSD-2 * Remote work * TPRO ECC Find out more * TPRO MOBILE Find out more TPRO PARTNER PROGRAM Interested in reselling tPro solutions on your local market? Comarch offers distributors and system integrators free access to: * Special pricing and sales lead protection * Trainings for technical and sales teams * Label and color customization * Technical support in English language * Visibility on the Comarch website Contact us to learn more about the tPro Partner Program and its benefits! AREAS * Pre-sales & new business Tools and features designed for efficient customer acquisition, policy offering and sales * Policy support & monitoring Mechanisms focused on the ongoing policy portfolio review, maintenance and support * Customers & communication Prospect and customer book with quick data access for efficient service and communication * Claim fundamentals Key claim functionality for servicing agents and customers requesting agent’s claim assistance * Tasking & campaigns Tools for work self-planning, reminder management and task handling * Business performance monitoring Predefined reports on various aspects of user performance for self-monitoring and analysis * Knowledge base Knowledge base for editor management to share corporate information and documents * Administration Access for business administrators to manage the application Download the Comarch Transaction Protection leaflet Download tPro Solutions leaflet Read more about how to protect your customers from internet frauds Download Want to learn more? Tell us about your business needs. We will find the perfect solution. Fill out the form Comarch Group Comarch SA al. Jana Pawła II 39a 31-864 Krakow NIP: 6770065406 About the Comarch Group Cookie settings Site map Cyber Security Banking Insurance Blog Case studies Financial Services unit Cyber Security Smooth Authentication tPro Solutions tPro Mobile tPro ECC Contact finance@comarch.com Contact Get social Copyright © 2015 - 2024 Comarch SA. All rights reserved. Personal Data and Privacy Policy | Cookie settings