Our ready-to-use
solutions
We develop innovative and modular security solutions designed for businesses seeking simplicity, efficiency, and compliance. Our solutions can be deployed on-premises or as SaaS, tailored to your company’s structure and needs.
Our four innovative solutions:

Sekrata Authenticate

Sekrata Single account

Sekrata Validate

Sekrata IAM

Access control solution
Strong 2FA authentication by call
SEKRATA Authenticate triggers an authentication request via a phone call to identify the user’s identity, authorize the execution of a critical action or access sensitive data.

Enhanced security
Secret code known only to the user, encrypted and saved by SEKRATA.

Benefits
+ secure, because the thief must steal the Mobile phone and know the SEKRATA Secret Code.
+ reliable and less restrictive than an SMS OTP code because the user does not need to retype a code provided by SMS.
+ availability because a simple telephone connection is sufficient.
– expensive than a standard SMS OTP.

Areas of application
Securing critical actions: connection requests, authorization of a transfer, modification of an order. Protection of sensitive and private data (e.g.: medical data).
How does it work?

1.
User authentication
When the connection is validated, we receive a strong authentication request.

2.
Validation by Sekrata
We call the user’s number to ask them to enter their password.

3.
User login
Once the identity is validated, the user is automatically connected.

Account sharing solution
Managing and limiting account sharing
For each new login, SEKRATA Single Account verifies the origin of the login request. If there is a risk of fraud, the user who owns the account is called to confirm their identity or to be notified about the GDPR risks associated with account sharing.

Advanced Connection Sharing Validation
Secret code known only to the user, encrypted and saved by SEKRATA.

Benefits
+ secure, because the thief must steal the Mobile phone and know the SEKRATA Secret Code.
+ reliable and less restrictive than an SMS OTP code because the user does not need to retype a code provided by SMS.
+ availability because a simple telephone connection is sufficient.
– expensive than a standard SMS OTP.

Areas of application
Securing critical actions: connection requests, authorization of a transfer, modification of an order. Protection of sensitive and private data (e.g.: medical data).

User account validation solution
Validating a user account
SEKRATA Validate generates a PIN code and calls the user to ask them to enter a random code to validate their identity.

Improved user experience
Account validation is performed in real time. The user does not need to change context, such as by checking their email.

Benefits
Fast and non-binding verification process.
Ensures the validity of the phone number.
Effective protection against spambots.
Avoids the tedious use of Captcha.

Solution for centralizing and managing user accounts
Centralized access management
With SEKRATA IAM/SSO, users log in at the start of their day and then have access to all their applications. The login is secure because after entering their username and password, the user is authenticated and identified by SEKRATA.

Benefits
Secure and centralized user account management.
Strong authentication without deploying an app on the phone or purchasing a token.
Compatible with all applications offering a SAML 2.0/ interface.

Areas of application
Centralization and security of user accounts for an SME/SMI.
Securing access for teleworking.

Open Source IAM Solution for Identity and Access Management
With SEKRATA, you have an expert partner to integrate, configure and optimize Keycloak in your environment, guaranteeing access management that is secure, flexible and sustainable.
Why choose Keycloak?
Keycloak helps strengthen user security through strong authentication and simplify access management.
Benefits
Enhanced security: strong authentication, centralized management and compatibility with standards (OIDC, SAML, OAuth).
Flexibility and integration: intuitive interface, federated directories, social logins and exclusive connectors.
Economy and independence: Open Source solution, without expensive licenses, enriched by an active community.
Performance and deployment: physical, virtual, container or cluster, high availability and robustness (Java/JBoss).
Ease of use: Quick integration, multi-language libraries, regular updates.
The advantages of SEKRATA solutions

Company

User
Security
Hack resistance! Your data remains secure even if your computer, phone, or SIM card is stolen.
Cost
A 20-second call costs 30% less than a text message. No tokens or mobile apps required.
Security
Even in case of mobile theft or SIM cloning, authentication remains protected thanks to the secret PIN code.
Ease
The user simply identifies himself via a voice call, without going through another application to retrieve his PIN code.
Installation
No third-party applications to install on the user’s phone.
Ease
SAML support and seamless integration through standardized, easy-to-use APIs.
Turnkey
If the user receives an authentication request that they did not initiate, they simply type “0” to block it.
Speed
Within seconds, SEKRATA contacts the user by phone to confirm their identity via their PIN code.
Contact
+33 (0) 1 84 38 03 80 +33 (0) 1 84 38 03 81
20, rue Darcet, 75017 – PARIS
