Transmit Security is an identity orchestration platform for enterprise applications. The Transmit Platform is designed to simplify, accelerate and reduce the cost of identity related projects such as authentication, authorization, fraud prevention and new account opening. Transmit Security enables enterprises to move from application requirements to implementation without touching any application code, via Over the Air Orchestration. Using the platform’s SAML integration, you can allow users to authenticate to your Citrix platform leveraging Transmit Platform benefits.
Transmit is a cross-channel identity platform designed to simplify, accelerate, and reduce the cost of identity-related projects, such as authentication, authorization, fraud detection, and account opening.
The platform allows enterprises to consolidate and accelerate multiple initiatives in the identity space while still supporting their existing IAM technologies, if needed. The platform’s built-in services save massive development, maintenance, and license costs, allowing faster adoption of innovation while avoiding building more "legacy."
The Transmit platform supports both customer-facing uses cases (CIAM) and workforce use cases (IAM). The platform’s modular Identity Services Hub allows connecting existing third-party services such as authenticators, identity-proofing tools, directories, and risk engines, or simply using out-of-the-box services provided by Transmit, in any of these categories.
Over-the-Air Orchestration provides a configurable way of coordinating the services to drive different identity-related user journeys. Transmit differentiates itself from other identity platforms by its extremely advanced run-time orchestration capabilities that are designed to replace long and complex application code.
One of the Platform's main use cases in a workforce environment is getting rid of passwords and replacing them with biometrics and the mobile device as an authenticator.
Passwords are widely used today to authenticate employees, contractors, and partners into enterprise systems. Some organizations are using a combination of passwords and tokens to enhance the level of security, which makes the authentication experience even more complex and the cost of the overall solutions extremely high. New, emerging technologies can replace both passwords and tokens and improve both the user experience and the level of security across the organization.
Transmit offers a wide range of connectors to various types of systems, including Windows 7 and Windows 10 workstations, Mac desktops and laptops, web applications, VPN and VDI systems, cloud applications such as Office365 and Salesforce.com, and mobile applications. Once connected, the relevant system turns to Transmit for the authentication and authorization process instead of asking for a password.
IT and security administrators can then use graphical tools to design the authentication and authorization process to each of the connected systems. The default behavior would be to push a notification to the user’s mobile device and have the user authenticate on the mobile device using biometrics such as fingerprint or face. Once completed, the user is automatically logged into the relevant system without the need for a password. To achieve that, Transmit provides an enterprise mobile app that users can download and register. The mobile app can be customized to the requirements of each organization, including logos, colors, texts, and full UX and UI journeys.
Based on policy, users can be asked to authenticate using one of the above techniques or can be offered a choice between various techniques. Moreover, the choice can be based on context, risk, and preferences. For example, if the user has a registered mobile app, then authentication is done through the app, and, if not, the authentication can be performed using an OTP and a 4-digit code. The security administrator has full flexibility in defining these policies. Different policies can be applied to different groups, roles of users, and machines. Based on policy, the platform can manage authentication either when the workstation is connected or disconnected from the domain controller as well as when the machine is completely offline.
The platform’s out-of-the-box risk detection functions can be used to enhance security and detect suspicious activity. For example, the location of the user’s mobile device can be checked during the login process as well as whether the time of day and the machine are normal for the specific user.