Stop social engineering attacks against your service desk with FastPass Identity Verification solutions

Hackers impersonate real users' identities to get a password from the service desk

identity verification solutions and social engineering attacks

FastPass Identity Verification Manager (IVM) controls the Help Desk's identity verification of the user's identity through a dynamic and secure workflow.

Perfect for identity verification solution for password reset

FastPass Infographic flow
  • Dynamic and contextual data from the user’s workstation and environment is used
  • The workflow will dynamically adapt to the users’ security profile
  • Information from many resources including Active Directory and external data is included
  • Comprehensive compliance reporting available plus SIEM integration
  • Remove privileged access from service desk supporters
  • FastPass IVM for password resets for AD, SAP, Oracle, IBM, LDAP and external WEB-services

Hackers use social engineering methods to con the service desk supporters to issue passwords for real users. Hackers can’t fool FastPass Identity Verification Manager to trust anything but facts. Give control to FastPass and stop the hackers!

IVM controls the entire identity verification process, to know your customer more. Instructing the service desk supporter what questions and tests to do depending on the user’s security profile. Remove the Service Desk privileged password. Trusted identity verification to secure help desk can be implemented fast based on FastPass templates.

youtube-video-thumbnail
Contact Us image

Contact FastPassCorp to discuss solutions to your situation

FastPass Identity Verification Process

The IVM Process

When a user calls the service desk to get a password reset then the service desk supporter uses IVM to verify the identity of the caller. 

For each correct or trustworthy answer, IVM credits point to the call. When enough points have been reached, then IVM will release a new password, to be passed on to the user.

To reduce the risk of identity fraud all information related to the user will be logged for monitoring and analysis in our user verification solutions. All details can be configured individually for the verification steps to fit the organization’s data and infrastructure and security policies.

IVM Features

IVM Management Process Icon

Management Approved Process

Identity Verification Manager can be configured individually to the organization’s security requirements. Improve user experience in the identity verification process

IVM Group processes

Different identity verification processes for different groups

IVM can provide an unlimited number of different processes linked to user groups and you don't even have to compromise on user experience to maintain system integrity

Identity Verification Options

Identity Verification options

IVM can use many different tests to verify the identity of the person such as secret personal information, company information, contextual & dynamic info, tokens & more

IVM Delievring passwords

Delivering passwords to the user

Can be delivered over the phone or to the user via SMS or private e-mail

IVM monitoring

Monitoring

Every step of the process is logged and available for monitoring and reporting to protect the users

IVM Integration to Tools

Integration to ITSM tools

Identity verification manager can be integrated into most modern ITSM tools, so the service desk agent sees IVM as a natural, integrated tools of the different services they provide to users

IVM Implementation

To achieve rapid results, IVM is delivered with templates that can be used as basic processes immediately. They correspond to a simple process, an average process, and a heavily secure process to protect its users from a wide range of identity fraud.

The templates can then gradually be altered or new ones can be added, as the service desk and IT security agree that adjustments need to be made.

This means that IVM can be installed and implemented very quickly.

The FastPass Identity Verification Manager suite currently covers

  • FastPass Self-Service Password Reset (SSPR)
  • FastPass Identity Verification Manager (IVM)

Identity verification benefits from the data and components of SSPR, so we recommend a combined solution.

Identity verification manager increases security and reduces the risks of social engineering, while SSPR delivers productivity and efficiency for both users and the service desk.

The combination of SSPR and IVM is a security solution with a strong business case.

youtube-video-thumbnail

IVM Functional Details

Identity Verification Manager controls the verification process – the service desk supporter assists IVM. This is crucial to prevent skilled hackers with good social engineering techniques take control via the supporter. See table below.

- Identity Verification Manager
Workflow per-user groupYES
Workflow per operator-user groupYES
Transfer call to other agentYES
Standard templatesYES
Access to user secretsYES
Hide user secretsYES
SMS for verificationYES
Other Token types - Email, TOTP, etc.YES
Manager approvalYES
Match PC-identity to user's PC(s)YES
Check user's geo-locationYES
Check user's login patternYES
Check user's logon timeYES
Check user's failed logon timeYES
- Identity Verification Manager
Check user's last password change timeYES
Define proofing processYES
Check user's last Self-service operationYES
Check user's last IVM callYES
Check user's lock timeYES
Check user's expiry dateYES
Check user's manager dataYES
Mandatory elementsYES
Render password to userYES
Integrate to ITSMYES
Check user's data in external systemYES
Warn operator of possible fraud callsYES
Automatic logging of all proofingYES
FastPass and Service Now Integration

FastPass is Technology Partner with ServiceNow

FastPassCorp offers a secure and forced workflow certified by ServiceNow. The integration is available from the ServiceNow Store.

Frequently Asked Questions

The Art of Deception book

If we want to take human error out of identity verification solutions and secure service desk, we must have an IT workflow controlling the agent. The process must be designed according to security specifications from IT security. There should be different processes for user groups with different security profiles. The tests must include many different items: data, tokens, and even manager approval, where needed.

The password reset process at the service desk can be an excellent industry-leading gateway for hackers to breach IT systems.

Learn more about how IVM can help your organization

Get in touch with us today by filling up the form and our team will get back to you as soon as possible.

Scroll to Top