Certainty is a Best Practice
You need to know that all the devices on your network are exactly what they claim to be. Device ID looks past the simple profile into the deep attributes to make sure you can be certain about what devices can access your data.


Passive, Always On and Server-Side

Security fails when it has gaps or relies on users for confirmation. Device ID works in the background to continuously confirm that every device is what it claims to be. Users don’t need extra apps or hardware, so you remain in control of your security.

Strengthen your existing network security with Device ID

In less than a few hundred milliseconds, more than 1000 tests are executed in order to determine the device’s configuration and used hardware in order to have a deep understanding of the hardware and whether it truly is what it claims to be. Your permissioning system will then allow the device to do what you have allowed it to do while you remain confident that you know exactly what every device on your network is.

Be Certain about Your Network Security

Accurately, continuously ensure that every device accessing your network is permitted to do so.

Built on Best Practices of More Advanced Technology

We’ve applied the complex best practices of identifying users with our unique biochronometric technology to our approach to identifying devices. You won’t get spoofed again.

Simple Set Up - No Hardware Required

Replace current solutions such as cards or dongles that are easy to lose, expensive to license & costly to reissue. All your users need to do is use their device to access your network. The rest happens in the background.

More Secure for Greater Security

Device ID identifies through deep analysis of the devices attributes that cannot be replicated on another device, not the standard encoded firmware or cookie technologies that can be compromised.

How It Works

Device ID works by examining the inner workings of the device through the browser. As the browser is unable to interact with the underlying hardware directly, indirect methods are used. Some device features can be easily determined such as display resolution, color depth, time zone and keyboard layout.

Each digital device has a unique signature which is a result of micro differences in the manufacturing process and no two devices are exactly alike. Similarly, the assembly of the components for no two devices will be exactly the same. At some micro- level, there will be differences, and these differences for a device that is electronically powered will result in different resonances which result in a unique identifiable profile for each device different from all others.

Other device characteristics require some more sophisticated methods, such as determining which pseudo random generator is used, which anti-aliasing technique the device’s video card uses, the implementation of mathematical functions, what browser engine is used (webkit, gecko, etc.).

Passive & Always On

For more details on how our Device Recognition will help protect your network

Customers don’t need to do anything special beyond what they already do. We don’t require special apps or hardware.

You remain in control of your permissioning and you always know what the devices on your network actually are, not just what they claim to be.