Partners


Our DNA™ security technology uses a standard API written in standard XML format to interface to key hardware and software applications. This approach allows us to offer a system architecture that is truly open-ended. The implication of this approach for your enterprise is that we will not obsolete systems nor require you to replace sub-systems that are working well. This includes physical security hardware and network hardware as well as network software. However, all devices must have the ability to recognize an API.

We can turbo-charge Oracle ID, make Windows AD more effective, manage proprietary secure networks or create a seamless, holistic physical and cyber-security system from scratch. But, it is our ability to work with all legacy systems deployed that makes the DNA™ solution particularly cost-effective.

Click Partners in the sidebar on the right for a description of companies with which we are in the process of establishing relations.

Prodentity's technical approach


There are three principles that underpin Prodentity's technology:

  • Authentication does not equal authorization
  • All authentication is not equal
  • Everything has an identity

Prodentity's Digital Network Authorization (DNA) product


DNA™ is highly attractive to those responsible for enterprise security as it does not attempt to solve system-level problems by addressing security at the enterprise sub-system level. Also, it is highly attractive to the enterprise participant as it makes security much more transparent, significantly reducing the number of technologies required for any given user without compromising system accessibility.

We have developed five basic tenets that will bring clarity to the potential user:

  • Securing the enterprise is more than just securing its parts
  • All authentication is not equal
  • Each entity is uniquely identifiable
  • Unique identification does not guarantee access
  • Different technologies can grant different scopes of access

Prodentity’s enterprise security approach merges with any solution to provide an architecture that can integrate all existing enterprise security components.