Audience

Businesses of any size, anywhere, who need simple, secure two-factor authentication.

About LoginTC

Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software.

LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more.

LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us.

LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.

Pricing

Starting Price:
$3/month/user
Pricing Details:
Starter tier (1-3 users): Free
Professional tier: $3/month/user
Business tier: $5/month/user
Enterprise: contact sales
Free Version:
Free Version available.
Free Trial:
Free Trial available.

Integrations

API:
Yes, LoginTC offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Cyphercor
Founded: 2011
Canada
www.logintc.com

Videos and Screen Captures

You Might Also Like
Full Control for Complex IT - Try PRTG Now Icon
Full Control for Complex IT - Try PRTG Now

Gain deeper insights and proactive alerts for your entire network. PRTG empowers you to optimize uptime and prevent costly outages.

As an IT monitoring expert, you need more than basic alerts - you need actionable data and full transparency. PRTG gives your team a single pane of glass for all systems, devices, and applications, with customizable dashboards and granular user management. Detect issues before they escalate, automate reporting, and ensure compliance with SLAs. PRTG’s scalable engine and advanced analytics help you optimize resources, reduce manual effort, and keep your organization running smoothly. Take control of your IT landscape and make smarter decisions with real-time, enterprise-grade monitoring.
Activate Your PRTG Trial Today

Product Details

Platforms Supported
Cloud
Windows
iPhone
iPad
Android
Chromebook
Training
Documentation
Live Online
Webinars
Videos
Support
Phone Support
24/7 Live Support
Online

LoginTC Frequently Asked Questions

Q: What kinds of users and organization types does LoginTC work with?
Q: What languages does LoginTC support in their product?
Q: What kind of support options does LoginTC offer?
Q: What other applications or services does LoginTC integrate with?
Q: Does LoginTC have an API?
Q: Does LoginTC have a mobile app?
Q: What type of training does LoginTC provide?
Q: Does LoginTC offer a free trial?
Q: How much does LoginTC cost?
Q: What pricing for support is available for LoginTC?
Q: What pricing for training is available for LoginTC?

LoginTC Product Features

Authentication

Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Policy Management
Self Service Portal
Biometric
Out-of-Band Authentication
Single Sign On
Social Sign On

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Data Security
Multi-Factor Authentication (MFA)
Self-Service Portal
User Provisioning
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Privacy / Consent Management
Real Time Notifications
Single Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Privileged Account Management
Self-Service Access Request
User Activity Monitoring
User Provisioning
Password Management
Single Sign On

User Provisioning and Governance

Access Governance
Delegated Access Authorization
Multi-Factor Authentication (MFA)
Policy Enforcement
User Self-Service
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Identity Synchronization
Lifecycle Management
Password Management
Single Sign-On (SSO)