Skip to main content
TrustRadius
CryptoPhoto

CryptoPhoto

Overview

What is CryptoPhoto?

CryptoPhoto is a high-security login and transaction-signing solution that aims to provide fast, easy, and reliable authentication for businesses of all sizes. According to the vendor, CryptoPhoto is designed to cater to a wide range of professions and industries, including banking, government, enterprise,...

Read more
Recent Reviews

TrustRadius Insights

CryptoPhoto has proven to be an effective solution for protecting staff, clients, and users against security threats like malware. Users …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Network Security Software

Be the first one in your network to review CryptoPhoto, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

What is ExtraHop Reveal(x)?

ExtraHop now offers Reveal(x), the company's network traffic analysis (NTA) and anomaly detection security application.

Return to navigation

Product Details

What is CryptoPhoto?

CryptoPhoto is a high-security login and transaction-signing solution that aims to provide fast, easy, and reliable authentication for businesses of all sizes. According to the vendor, CryptoPhoto is designed to cater to a wide range of professions and industries, including banking, government, enterprise, small business, critical infrastructure, IT professionals, web developers, e-commerce companies, financial institutions, and government organizations.

Key Features

Secure transaction verification: According to the vendor, CryptoPhoto offers secure transaction verification through out-of-band user approval, aiming to protect against malware, impostors, scammers, and other adversaries.

10x faster 1st time enrolments: The vendor claims that CryptoPhoto provides a fast and efficient first-time enrollment process, allowing users to quickly set up their accounts and start using the authentication system.

Any device, anywhere, always works: CryptoPhoto is designed to be compatible with any device and accessible from anywhere, aiming to ensure that users can access the system and authenticate transactions without limitations.

10x faster to use: option to safely go passwordless: According to the vendor, CryptoPhoto offers the option to go passwordless, aiming to eliminate the need for passwords and provide a faster authentication experience compared to other 2-factor authenticators.

One-tap logins - in under 2-seconds: CryptoPhoto enables one-tap logins, allowing users to authenticate themselves with a single tap, aiming to make the login process quick and convenient.

Mutual multifactor auth: According to the vendor, CryptoPhoto supports mutual multifactor authentication, providing a defense against phishing, social engineering, malware, and other common attacks.

NIST SP800-63-3 AAL3 compliant (world’s strongest rating): CryptoPhoto is claimed to meet the highest security standards by being compliant with NIST SP800-63-3 AAL3, which is considered the world's strongest authentication rating.

Verifier impersonation resistance (Blocks phishing & social-engineering): CryptoPhoto includes a verifier impersonation resistance feature to block phishing and social engineering attacks, aiming to protect users from such exploits.

Block Phishing: CryptoPhoto is designed to effectively block phishing attacks, aiming to prevent hackers from stealing user credentials through deceptive tactics.

Neutralize Malware: According to the vendor, CryptoPhoto aims to neutralize the damage caused by malware by providing out-of-band transaction signing, aiming to protect user actions from malware interference.

CryptoPhoto Features

  • Supported: Access Controls/Permissions
  • Supported: Activity Monitoring
  • Supported: Intrusion Detection System
  • Supported: VPN

CryptoPhoto Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based, Android, iPhone, iPad
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

CryptoPhoto has proven to be an effective solution for protecting staff, clients, and users against security threats like malware. Users appreciate the two-way mutual authentication feature that ensures a secure connection with the system. With segregated integrity-based multi-device key provision, CryptoPhoto offers robust protection against malware and breach damage. Customers have found it to be a reliable alternative to other token generating apps, using it for both work and personal accounts after experiencing hacking incidents. In today's digital landscape, where online profile security is paramount, CryptoPhoto is highly valued for its ability to safeguard users' identities and prevent embarrassing situations. The cloud-based authentication option allows users to protect websites and mobile devices from various types of attacks, while the flexibility to choose between the cloud version or on-premise authentication appliances has been praised by users. The diverse set of images for authentication contributes to a positive user experience, and the competitive pricing makes CryptoPhoto an attractive choice for those seeking enhanced security measures. Furthermore, users have found that CryptoPhoto offers a faster and more secure alternative to traditional passwords, particularly in combating keyloggers. Overall, CryptoPhoto has received positive recommendations from users, making it an ideal option for anyone looking to strengthen their security protocols.

High-security authentication: Reviewers have praised CryptoPhoto for its high-security authentication process, with several users stating that it provides a strong and reliable defense against security threats.

Convenient and easy to use: Many reviewers have found CryptoPhoto to be a convenient and user-friendly solution, highlighting its fast setup and lack of learning curve. Users appreciate the simplicity of adding an OTP token and using images for verification, making the authentication process enjoyable.

Effective protection against phishing: Several users have mentioned that CryptoPhoto offers effective protection against phishing attempts. They appreciate the added security provided by two-factor authentication, which blocks potential security issues such as phishing scams, fake websites, and insecure Wi-Fi connections.

Subpar Image Quality: Some users have expressed their disappointment with the image quality in CryptoPhoto, mentioning that they feel it could be improved. They have compared the images used in CryptoPhoto to stock photos commonly seen in Google Captcha.

Lack of Advanced Features: Several users believe that while CryptoPhoto is a great software overall, there is room for improvement when it comes to adding advanced features and functions. They would like to see additions such as vulnerability scanning and the ability to work with email attachments.

Questionable Effectiveness Against Threats: There are concerns among some users regarding the effectiveness of CryptoPhoto in blocking all phishing and fake websites, as well as protecting against malware, viruses, and trojans. They worry that it may not provide comprehensive protection against these threats.

Sorry, no reviews are available for this product yet

Return to navigation