{"id":2537,"date":"2022-03-11T12:54:43","date_gmt":"2022-03-11T12:54:43","guid":{"rendered":"https:\/\/www.tokntechnology.com\/global?page_id=2537"},"modified":"2023-10-23T07:06:23","modified_gmt":"2023-10-23T07:06:23","slug":"security","status":"publish","type":"page","link":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/","title":{"rendered":"Secure. Always."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2537\" class=\"elementor elementor-2537\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-248bd34c elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle exad-glass-effect-no exad-sticky-section-no\" data-id=\"248bd34c\" data-element_type=\"section\" id=\"next\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e4b5aaa exad-glass-effect-no exad-sticky-section-no\" data-id=\"7e4b5aaa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a4b5694 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4a4b5694\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Secure. Always.<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0a3aba exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f0a3aba\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Keeping your data secure is essential to keep your business protected. Have the peace-of-mind that everything is safe with TOKN.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f5f18d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"7f5f18d5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74d044df exad-glass-effect-no exad-sticky-section-no\" data-id=\"74d044df\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35a845ad animated-slow exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-image\" data-id=\"35a845ad\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"927\" height=\"690\" src=\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png\" class=\"attachment-full size-full wp-image-2268\" alt=\"\" srcset=\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png 927w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-300x223.png 300w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-768x572.png 768w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-134x100.png 134w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-107x80.png 107w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-394x293.png 394w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1-915x681.png 915w\" sizes=\"(max-width: 927px) 100vw, 927px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fe884d0 exad-glass-effect-no exad-sticky-section-no\" data-id=\"3fe884d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-257ac136 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"257ac136\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Seamless Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-130dcdcc exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"130dcdcc\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">TOKN comes with out-of-the-box industry standard security features, that do not compromise the user experience.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa25e89 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fa25e89\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">The TOKN Client includes bi-factor authentication with push code messaging as standard.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3608c69 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3608c69\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">TOKN provides a secure container housing all TOKN apps and data. Data in transit is secured via Secure Sockets Layer encryption, using 2048bit RSA keys.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-db77548 elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"db77548\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;tilt&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2dd8ff34 exad-glass-effect-no exad-sticky-section-no\" data-id=\"2dd8ff34\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cf68682 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7cf68682\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authentication made easy<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2425d7 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b2425d7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">All users need is a mobile number. TOKN lets you on-board new users with a simple push-code message, with two factor authentication as standard.\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69e04b96 exad-glass-effect-no exad-sticky-section-no\" data-id=\"69e04b96\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dbf4c12 animated-slow exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-image\" data-id=\"1dbf4c12\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"656\" height=\"552\" src=\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient.png\" class=\"attachment-full size-full wp-image-2465\" alt=\"\" srcset=\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient.png 656w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient-300x252.png 300w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient-119x100.png 119w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient-95x80.png 95w, https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/website_template_TOKNclient-360x303.png 360w\" sizes=\"(max-width: 656px) 100vw, 656px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcd1e2f elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"dcd1e2f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ac652e8 exad-glass-effect-no exad-sticky-section-no\" data-id=\"5ac652e8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cd6dc83 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3cd6dc83\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Get Answers<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1f4068 elementor-widget__width-initial exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c1f4068\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-489f45f0 exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"489f45f0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Dive a little bit deeper into how TOKN provides unmatched mobile productivity improvements. <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5064484c elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"5064484c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ca8cb30 exad-glass-effect-no exad-sticky-section-no\" data-id=\"3ca8cb30\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40adfefd exad-sticky-section-no exad-glass-effect-no elementor-invisible elementor-widget elementor-widget-toggle\" data-id=\"40adfefd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1081\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1081\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is bi-factor authentication?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1081\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1081\"><p>Bi-factor authentication is a method of establishing access to an online account or application that requires the user to provide two different forms of identification. With bi-factor authentication, you\u2019ll need to both provide a password and another alternative piece of information to gain access.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1082\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1082\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Is AWS secure?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1082\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1082\"><p>AWS provides strong security isolation between your containers, ensuring you are running the latest security updates, giving you the ability to set granular access permissions for every container (see more here: https:\/\/aws.amazon.com\/containers\/).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1083\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1083\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Does TOKN support multi-factor authentication and data encryption at all levels?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1083\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1083\"><p>On enrolment, with refreshed tokens, TOKN enforces Multi-factor authentication setup for end users as standard across all of the TOKN products. TOKN has an incredibly simple enrolment process for new users, ensuring that security is not compromised, while making it really easy for the user to adopt. This utilises the user\u2019s mobile number and a 6-digit code (delivered by SMS to the device) for setup. The 6- digit code allows for 62 to the exponent of 6 combinations of codes (56 billion). In transit communication, using SSL encryption certificate with a 2048-bit cryptographic key, a secure web socket technology. At rest data on encrypted DB instances using the industry standard AES-256 encryption algorithm to encrypt data on the server. After data is encrypted, Amazon RDS handles authentication of access and decryption of data transparently with a minimal impact on performance. Amazon RDS encrypts the databases using keys with the AWS Key Management Service (KMS). On a database instance running with Amazon RDS encryption, data stored at rest in the underlying storage is encrypted, as are its automated backups, read replicas, and snapshots. RDS encryption uses the industry standard AES-256 encryption algorithm to encrypt data. In addition, TOKN Control includes complete remote security administration controls. If a Device is lost or stolen administrators are able to remote wipe and blacklist individual devices, centrally, from the TOKN console. In addition, TOKNS also employs the complete authorisation protocols used by the connected ERP systems, a user must have authorisation in that system, to access and transact, just like they would if they were logged into that system.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1084\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1084\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How are individual users identified?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1084\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1084\"><p>TOKN uses an email address and mobile number as unique identifiers for a user. A user will automatically be recognised at the time of login to the system or mobile application, ensuring each individual is receiving the correct information, based on their individual permissions.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1085\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1085\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Are the TOKN third party approval links secure?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1085\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1085\"><p>TOKN has the capability to allow a user access to a specific record via a secure link, delivered via email notification. Only the relevant authorised users has access to the relevant event information, should an email link be sent to an unauthorised user.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is bi-factor authentication?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Bi-factor authentication is a method of establishing access to an online account or application that requires the user to provide two different forms of identification. With bi-factor authentication, you\\u2019ll need to both provide a password and another alternative piece of information to gain access.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Is AWS secure?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>AWS provides strong security isolation between your containers, ensuring you are running the latest security updates, giving you the ability to set granular access permissions for every container (see more here: https:\\\/\\\/aws.amazon.com\\\/containers\\\/).<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Does TOKN support multi-factor authentication and data encryption at all levels?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>On enrolment, with refreshed tokens, TOKN enforces Multi-factor authentication setup for end users as standard across all of the TOKN products. TOKN has an incredibly simple enrolment process for new users, ensuring that security is not compromised, while making it really easy for the user to adopt. This utilises the user\\u2019s mobile number and a 6-digit code (delivered by SMS to the device) for setup. The 6- digit code allows for 62 to the exponent of 6 combinations of codes (56 billion). In transit communication, using SSL encryption certificate with a 2048-bit cryptographic key, a secure web socket technology. At rest data on encrypted DB instances using the industry standard AES-256 encryption algorithm to encrypt data on the server. After data is encrypted, Amazon RDS handles authentication of access and decryption of data transparently with a minimal impact on performance. Amazon RDS encrypts the databases using keys with the AWS Key Management Service (KMS). On a database instance running with Amazon RDS encryption, data stored at rest in the underlying storage is encrypted, as are its automated backups, read replicas, and snapshots. RDS encryption uses the industry standard AES-256 encryption algorithm to encrypt data. In addition, TOKN Control includes complete remote security administration controls. If a Device is lost or stolen administrators are able to remote wipe and blacklist individual devices, centrally, from the TOKN console. In addition, TOKNS also employs the complete authorisation protocols used by the connected ERP systems, a user must have authorisation in that system, to access and transact, just like they would if they were logged into that system.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"How are individual users identified?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>TOKN uses an email address and mobile number as unique identifiers for a user. A user will automatically be recognised at the time of login to the system or mobile application, ensuring each individual is receiving the correct information, based on their individual permissions.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Are the TOKN third party approval links secure?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>TOKN has the capability to allow a user access to a specific record via a secure link, delivered via email notification. Only the relevant authorised users has access to the relevant event information, should an email link be sent to an unauthorised user.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c3f335a elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no exad-sticky-section-no\" data-id=\"c3f335a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2668c56 exad-glass-effect-no exad-sticky-section-no\" data-id=\"2668c56\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure. Always. Keeping your data secure is essential to keep your business protected. Have the peace-of-mind that everything is safe with TOKN. Seamless Security TOKN comes with out-of-the-box industry standard security features, that do not compromise the user experience. The &hellip; <a href=\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":977,"menu_order":27,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"","footnotes":""},"class_list":["post-2537","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seamless Security | Secure. Always. | TOKN Technology<\/title>\n<meta name=\"description\" content=\"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seamless Security | Secure. Always. | TOKN Technology\" \/>\n<meta property=\"og:description\" content=\"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"TOKN Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T07:06:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tokntechnology.com\/globalwp-content\/uploads\/2022\/03\/bpartner1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\",\"name\":\"Seamless Security | Secure. Always. | TOKN Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tokntechnology.com\/globalwp-content\/uploads\/2022\/03\/bpartner1.png\",\"datePublished\":\"2022-03-11T12:54:43+00:00\",\"dateModified\":\"2023-10-23T07:06:23+00:00\",\"description\":\"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png\",\"contentUrl\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png\",\"width\":927,\"height\":690},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tokntechnology.com\/global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform\",\"item\":\"https:\/\/www.tokntechnology.com\/global\/platform\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure. Always.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#website\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/\",\"name\":\"TOKN Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tokntechnology.com\/global\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seamless Security | Secure. Always. | TOKN Technology","description":"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/","og_locale":"en_US","og_type":"article","og_title":"Seamless Security | Secure. Always. | TOKN Technology","og_description":"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.","og_url":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/","og_site_name":"TOKN Technology","article_modified_time":"2023-10-23T07:06:23+00:00","og_image":[{"url":"https:\/\/www.tokntechnology.com\/globalwp-content\/uploads\/2022\/03\/bpartner1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/","url":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/","name":"Seamless Security | Secure. Always. | TOKN Technology","isPartOf":{"@id":"https:\/\/www.tokntechnology.com\/global\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage"},"image":{"@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tokntechnology.com\/globalwp-content\/uploads\/2022\/03\/bpartner1.png","datePublished":"2022-03-11T12:54:43+00:00","dateModified":"2023-10-23T07:06:23+00:00","description":"Experience industry-standard security with TOKN. Protect your data without compromising user experience. Explore our secure container and authentication features.","breadcrumb":{"@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tokntechnology.com\/global\/platform\/security\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#primaryimage","url":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png","contentUrl":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/bpartner1.png","width":927,"height":690},{"@type":"BreadcrumbList","@id":"https:\/\/www.tokntechnology.com\/global\/platform\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tokntechnology.com\/global\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.tokntechnology.com\/global\/platform\/"},{"@type":"ListItem","position":3,"name":"Secure. Always."}]},{"@type":"WebSite","@id":"https:\/\/www.tokntechnology.com\/global\/#website","url":"https:\/\/www.tokntechnology.com\/global\/","name":"TOKN Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tokntechnology.com\/global\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"}]}},"_links":{"self":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/pages\/2537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/comments?post=2537"}],"version-history":[{"count":0,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/pages\/2537\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/pages\/977"}],"wp:attachment":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/media?parent=2537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}