AUTHENTICATION AND AUTHORIZATION

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/www.mentisinc.com-37861704367690.jpg” background_size=”initial” custom_padding=”1px||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” custom_padding=”10px|||||” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” _i=”0″ _address=”0.0.0.0″]

authentication and authorization

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”18px” custom_padding=”2px||3px|||” _i=”1″ _address=”0.0.0.1″]

Because passwords aren’t enough.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”#resources” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” _i=”0″ _address=”1.0.0.0″]

unauthorized access accounts for 45% of security incidents

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”0″ _address=”1.1.0.0″]

Protect sensitive data in native cloud applications as well as host-based applications

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ _i=”2″ _address=”1.2″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”1.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|9px|0px|false|false” custom_padding=”|10px|26px|10px|false|false” _i=”0″ _address=”1.2.0.0″]

IVERIFY

The weakest link in security is the password. iVerify’s two-factor authentication (2FA) requires two types of credentials to authenticate user identity before allowing access to systems. Our independent token generation is not dependent upon connections, bringing additional strength.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”1.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”223px” custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|44px|10px|false|false” _i=”0″ _address=”1.2.1.0″]

IPROTECT

Implement robust user controls to prevent unauthorized access to your Production database. Assign and manage access for new users. Control user access with customizable levels of access. Authorize the program, terminal, and time of day that access is allowed for each user.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”26px” custom_padding=”||2px|||” header_font_size_last_edited=”on|desktop” _i=”0″ _address=”2.0.0.0″]

Improve security with minimal performance impact

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”2.1.0.0″]

With over a billion passwords (and counting) compromised, defending against credentials-stuffing attacks should be mandatory.

Your security is only as good as its weakest link, and credentials-based access is that weakest link.

MENTIS’ authentication and authorization solutions allow you to take a pro-active approach to preventing unauthorized access to your sensitive data. First, verify users by adding a second, more secure layer to the login process; second, block access based on risk with custom restrictions that you assign, such as time of day, workstation, or geographic location, among others.

MENTIS provides the tools to reduce this common risk without compromising your ability to have the data access your organization needs. Take care of business.

MENTIS. We’ve got your back.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ custom_margin=”|auto|2px|auto||” _i=”2″ _address=”2.2″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.2.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”REQUEST A DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_translate=”1px|2px” transform_translate_phone=”0px|2px” transform_translate_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”||0px|||” saved_tabs=”all” _i=”0″ _address=”2.2.0.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”3.0.0.0″]

MENTIS Advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”3.1.0.0″]

INTEGRATED & COMPREHENSIVE

A complete data and application security that covers discovery, anonymization, monitoring, and retirement of personal data.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”254px” custom_margin=”|0px|13px|0px|false|false” custom_padding=”|10px|4px|10px|false|false” _i=”0″ _address=”3.1.1.0″]

AUDITABLE

A complete audit log of all activities from discovery to the retirement of personal data, downloadable in Excel and other formats.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|109px|10px|false|false” _i=”0″ _address=”3.1.2.0″]

INTEGRATED

A single integrated platform that covers all key data sources such as structured, unstructured, big data and cloud.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”resources” _builder_version=”3.27.4″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”4.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”214px”]

SENSITIVE DATA

iDiscover locates ALL sensitive data with minimal false positives.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

CASE STUDY – FORTUNE 15 COMPANY

MENTIS helped a fortune 15 global conglomerate to find sensitive data across PeopleSoft, SAP applications

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” inline_fonts=”fun city level 2″ _i=”0″ _address=”0″]

CASE STUDY – LARGEST PRIVATE BANK IN DR

MENTIS helped the largest private bank in Dominican Republic to find all sensitive data in DB2 and Oracle databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

CONTINUOUS MONITORING

iMonitor watches user activity on sensitive data, with breach notification capabilities.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”173px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|37px|10px|false|false” _i=”0″ _address=”0″]

SENSITIVE DATA RETIREMENT

MENTIS helps you comply with subject data rights like “Right to be Forgotten”.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NTAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]