LOGINtorney : Where it all begins.
SAFER CREDENTIALS FROM IDtorney.
Where it all starts.
Use a safer ID we create for you that is dedicated to safety.
Become holistically safer in 3 steps:
LOGINtorney + MAILtorney + SECRETtorney
> Turnkey new login identity as simple as using a smartphone.
STEP 2: DIGITAL IDENTITY SECURED IN THE CLOUD: passwordless & protections with ephemeral browsing in enterprise profiles.
HOW DO THE FIRST STEPS FEEL?
> "Turnkey" delivery of optimally aggregated security products, managed and administered holistically for ALL client's benefit.
> The baseline configuration includes confusion-free on-boarding with up to 10 products from established players.
> Training and support is always available. You decide how much you need or want.
No on-boarding headaches, no loneliness after launch, yet you still own your privacy.
Experience how seamless it is to use end-to-end encrypted products.
Experience passwordless tools you can believe in with a pragmatic view of how to work better in the cloud remotely.
An enterprise-grade logistic for deployment at scale yet enjoyable at an individual and human scale.
What about achieving in days or weeks, not months:
Smarter credentials with strong authentication throughout your current logins?
Noticeable pleasure with passwordless tech, security keys and human-assisted implementation?
Actual follow-up with an Attorney by your side to make sure all remains administered right and properly documented?
Then comes your leveraging of our daily weapons:
CLAIM YOUR DIGITAL IDENTITY DEDICATED TO CYBERSAFETY:
Click for more
The twist? It's "enterprise-grade" with cutting-edge aggregation of technologies from established Tech leaders.
It introduces "client-attorney" protections to manage digital secrets in cybersecurity. But above all, it is designed to always appeal to a wide public.
Want a G-7 country, contractually secure and honored by a strong rule of law for your cybersecurity matters?
We are in Montreal, Québec, Canada
AND > We are ready for YOU > Anywhere might you be.
> CREATED & HOSTED WITH A LICENSED ATTORNEY
Click for more
IDtorney can help you directly or collaborate with ANY Attorney you want us to collaborate with.
We are attorneys believing real enhancements occur when Digital Citizenship:
> no longer has to be a lonely sport.
We are venturing into hosting directly key aspects of your Digital IDs to leverage untapped cybersecurity virtues of the well-established:
> legally strong "Client-Attorney Privilege".
SAFER LOGIN, SAFER BROWSING, SAFER YOU.
3 steps to unified passwordless login security from tools we deploy.
Turnkey since we host everthing for you.
Via a limited-scope legal mandate, we further become your sidekick and Digital Citizenship Gatekeeper.
Designed to be trustworthy from inception and your PERSONA for cybersecurity.
> Attorney hosting: Safer-by-design now
Long-term cyber-defense planning
Adaptability without conflict of interest or single provider dependency
Digital ID perennial planning for succession to heirs
Tools legally engineered to reduce the hacking surface of attack.
BECAUSE EVERYWHERE YOU MUST LOGIN TO IDENTIFY YOURSELF
LOGINtorney for the cloud: a single product-pack of up to four of the following components
PASSWORDLESS SECURITY AND YOUR IDENTITY PROVIDER WITHIN IDtorney
Our primary Full Stack identity provider with passwordless authentication.
a comprehensive and frictionless solution fully-secured with dynamic passcodes and out-of-band multi-factor authentication.
> With Attorney hosting: become safer-by-design
Long-term cyber-defense planning.
Adaptability without conflict of interest or single provider dependency.
Tools legally engineered to reduce the hacking surface of attack.
Digital ID perennial planning for succession to heirs.
>100% of our clients start their passwordless journey via IDtorney hosting for them:
a new digital identity managed via SAASPAAS and;
the single sign-on and protections afforded by the full spectrum of the enterprise capabilities gained from their new Google Cloud Identity Premium account.
> Although Google for Enterprise does not need any introduction, SAASPAAS sometimes does. Hence a glimpse.
NASA (nasa.gov) - BOEING (boeing.com) - VISA (visa.com)
THE MOST ADVANCED SINGLE SIGN ON AND AUDITING PLATFORM
Our supplemental identity provider with extensive single sign-on features, mobile compatible and extensive security features.
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.
MANDATORY ADDITIONAL HARDWARE SECURITY
SO HAVING A VPN AVAILABLE ALL THE TIME EVERYWHERE IS A GIVEN
Online privacy and security, encrypt your internet connection, and keep your browsing history private
A fast connection, and no limits on bandwidth. 5300 NordVPN servers in 59 countries to enjoy the fastest VPN experience.
BECAUSE YOU CAN'T NEGOTIATE DEVICES SAFETY AND SECURITY
LOGINtorney for hardware: a single product-pack of up to four of the following components
SO YOU HAVE THE MOST SECURE COMPUTER
Google Chrome Enterprise unlocks the business capabilities of Chrome OS, Chrome Browser, and Chrome devices.
Enjoy the protections of ephemeral browsing sessions, yet personalized by IDtorney with essentials security and privacy Chrome extensions.
Strong auditing features, constant updates easy remote support by IDtorney and enterprise grade controls.
SO YOU HAVE
> WINDOWS 10 <
ON THE MOST SECURE COMPUTER
Parallels®️ Desktop for Chromebook Enterprise.
Bringing the power of the safest Windows experience on Chromebooks: Unleash the full potential of the Chromebook AND the full power of the Windows ecosystem
Run full-featured Windows applications, including native Microsoft Office, on Chromebook Enterprise devices — online and offline.
SO YOUR DEVICES ARE REAL-TIME AUTHENTICATED
Origin: Canada, security is NIST Continuous Authentication compliant.
Plurilock Defend: Full-day, real-time identity without extra hardware.
Spots and monitors unauthorized credential use all day long—no extra devices, steps, or workflows.
SO YOU CAN BREAK-UP WITH ACTIVE DIRECTORY
A GOOD THING!
WHATEVER THE DEVICE, NOW WITH MFA EVERYWHERE.
WHEREBY ANY EXISTING CORPORATE LOGIN CAN BE STRENGHTENED
Enterprise grade multi-Factor authentication especially suited for corporations that need to supplement their existing infrastructure with additional deviceless security, that have not fully embraced the cloud or need to deal with hybrid environments.
CLIENT-ATTORNEY PROTECTIONS FOR YOUR CYBERSECURITY
We HOST your new digital ID & tools on our systems. A new type of limited-scope legal mandate is signed to become the foundation of you secure ID secrets.
The goal? Mitigate hacking risks typically found in recovery protocols (ex. forgotten password)
Click to learn more
[<YES> this is new, mostly unheard of... yet. After the initial learning curve, our clients typically wonder how they ever lived without.]
The 5 vectors of defense we currently deploy:
1) IDENTITY: a new email serving as Digital ID & your secure login key in the cloud. Created & hosted on IDtorney owned domains: 10+ domains available
Enterprise Google Coud Identity
Enterprise Chrome Sync browsing in secure ephemeral sessions.
SINGLE-SIGN ON: redundantly protected in 2 products.
PASSWORDLESS logins: go ahead, forget those passwords!
PASSWORD MANAGERS for all the rest: redundantly protected in up to 3 secure products working in the background.
MULTI-FACTOR AUTHENTICATION: native in all our login tools...keep hacker's life difficult.
2) EMAIL: a new box linked to your ID and encrypted end-to-end with tech better than PGP protocol.
a highly secure encrypted email to concentrate your recovery emails away from your regular work or personal profiles,
the capacity to effect extremely LARGE FILES TRANSFER via PGP encryption. Performs best up to 25GB, but without actual file size limit.
3) REMOTE WORK SECURITY: end-point protection with double benefits.
IDtorney will never access your personal profile. You can effectively keep your existing private profile private on your laptop and smartphone.
Windows, Mac or Linux, we secure you via a totally distinct ephemeral Chrome enterprise profile on any desktop/laptop.
On mobile, it's native in ANDROID and very quick to implement.
Get 2 APP stores and 2 environments that don't commingle on privacy yet collaborate to give you a unified experience.
With "IDtorney ENTERPRISE for mobile" IDtorney can further protect sensitive data on your smartphone, and keep 100% privacy of your private one. It's like having 2 phones persona in one!
Specifically for iPhone:
Deployment is supported, but an "in-person" attendance may be required to install the appropriate security certificates.
4) DRIVE: end-to-end encrypted cloud storage and backup for your other existing cloud drives.
... where you don't typically own the encryption keys. With us? You now do.
An extremely long list of compliance certifications: HIPAA, GDPR, PIPEDA and data stored in CANADA.
It doubles your existing cloud drive by adding a serialization of all your files history for 365 days (you can recover an old version as needed) and a secure backup of your existing: Dropbox, Onedrive, GDrive, etc.
5) VPN: never browse unprotected again, don't get logged and avoid known malicious web addresses.
All provided by NordVPN which has long been known for:
A strong "no logs" policy.
Allowing 6 simultaneous connections, via mobile, desktop or specific routers
CYBERSEC native protections from known malicious websites.
On desktop & laptops: possibility to route via a DOUBLE VPN using 2 countries simultaneously
A worldwide network of 5878 servers in 59 countries.
DEPLOYMENT IN DAYS NOT WEEKS.
We supplement your existing environment without any hard disruption. As much for individuals than enterprises.
There's always time to integrate later, but actionable benefits shouldn't have to wait.
Click to learn more
True Passwordless peace
"Beyond Corp" implementation
Native multifactor protection
Native Security keys support (Fido U2F & Yubikeys)
True Cloud Identity portability with another Attorney of your choice.
Security Center, audit and login traceability.
Native-by-design redundancy of systems.
Zero-knowledge trust wherever possible.
Native end-to-end encryption in nearly all Identity Products.