Shaping the Future of Secure User Authentication
A ingenious Patented replacement for user authentication.
You simply in your mind pick a section (1-10) as shown above, and like a safe dial turn it so the letters in your password rest in the section you are thinking of.
Only you know what you are thinking of, that information is never entered which is key in proving your authentication.
Enhanced Security:
Access Defender significantly mitigates the risk of credential theft by eliminating password transmission, thereby protecting against interception, hacking, and recording. This enhancement bolsters the overall security posture for both individuals and organizations.
It offers superior security as no password is ever entered, leaving nothing to steal or copy. You log in by demonstrating knowledge of the password without ever actually entering it. This represents a revolutionary shift in authentication technology and is the only way to ensure truly secure authentication.
By never storing, encrypting, or encoding passwords and never transmitting authentication details over the internet, Access Defender prevents all known methods of credential theft and authentication hacking. This includes protection against interception, decryption, man-in-the-middle attacks, tempest attacks, and forensic gathering techniques like Wireshark.
If your password exists solely in your mind, there is nothing for a hacker to steal! Consequently, your only risk would be from those who can read minds.
A senior SD / CEO with over 30 years’ experience in Rapid Business Development as a vendor, distributor and VAR.
In-depth industry knowledge – my background covers many geographies, across all disciplines and with full P&L responsibility, from technical through product management, logistics, marketing to sales, channel development and service management of multicultural teams means I can understand and communicate the trends, drivers and underlying issues to increase market share and value.
Proven ability in delivering Exceptional growth – having led both vendor and distribution operations to becoming market leaders by consistently, achieving above target growth and industry-leading bottom-line performance, underscores my ability to mentor, manage, strategize, innovate, plan, execute, and to operate businesses in a most cost-effective manner, while ensuring excellent customer satisfaction and an ongoing simplification of processes, meeting both customer and company needs.
David served as the Managing Director at Cryptic Software Limited for a decade, where he successfully raised £3 million pounds. Under his leadership, the company designed and built a state-of-the-art SIEM. His vast expertise in the technical domain is evident from his contributions to numerous military, government, and Special Forces projects. David was instrumental in creating a security solution for the Government's Defense Evaluation Research Agency (DERA), developing trail of evidence tools for the Metropolitan police, and collaborating with New Scotland Yard in detecting illicit online content. He design technology for prominent government projects like CHOTS and LITS and frequently worked and collaborated with IBM.
In the commercial sector, David's technical expertise was sought by major corporations and agencies. He worked as a consultant for Royal Mail and the Ordinance Survey.. He further extended his consultancy services to renowned names like Volvo, Fullers, and The Environment Agency. In addition, he had contracts with international giants such as Deutsche Telekom, Deutsche Bank, US 7th Army in Germany, and Barclaycard.
Apart from his technical roles, David has a notable presence in the media and academic sectors. He was the go-to security specialist on the Gadget Show, both for BBC and Sky TV. His insights into the hacking domain are highly valued, leading to frequent appearances on BBC radio to discuss current affairs. With strong ties in the media, press, and television, he is a recognized figure in the industry. As an academic, David has been a keynote speaker at InfoSec multiple times and has lectured at prestigious institutions like the RAF Royal Defense Academy and PWC.
Starting his journey with Rolls Royce Military Aerospace in 1983 and a BSc Eng from Coventry University, Andrew is a seasoned professional with over 30 years in IT. Andrew has a rich history in executive roles with global giants like IBM, Amdahl Hewlett Packard, UK MoD DERA (QinetiQ) plus latterly DXC.
Andrew had developed go to market strategies and technical security solutions for digital transformation, covering everything from strategic consulting advisory to enterprise risk management. His career includes roles for private corporations, law enforcement and the UK government. Andrew’s expertise lies in thought leadership and delivering global solutions, marked by a proven track record.
Now his focus is towards Digital IT security in the UK, offering independent advice and guidance that delivers tangible ROI. Andrew’s transition from poacher to gamekeeper embodies his commitment to securing the digital landscape for his clients as he utilises his corporate expertise to support new innovations to help combat cyber challenges.
Justin Ranson
Justin has over twenty years’ experience at senior management level in product research and development undertakings, possessing key skills in situational analysis and problem-solving efficiency. Specialising in high growth, start-up and turnaround situations, he has been a founding member in a number of hi-tech companies covering areas as diverse as Cyber Security, data compression, FBAR based biosensors, musical instrument design, social media mobile application development and dedicated advertisement deployment systems.
Passionate about the transformative potential of artificial intelligence, Jason incorporates cutting-edge AI technologies into his solutions, driving innovation and efficiency in every endeavour. He recognises the importance of Cyber security and providing essential support to small and medium businesses in the UK, protecting their digital assets in an increasingly complex cyber landscape.
Description
Using software or hardware to record keystrokes to capture passwords.
Points
Description
Trying all possible combinations until the correct password is found.
Points
Description
Using a list of common passwords and variations to guess the password.
Points
Description
Using breached username/password pairs from other sites.
Points
Description
Intercepting communication between the user and the server.
Points
Description
Infecting a device to capture passwords or bypass authentication.
Points
Description
Trying a few common passwords across many accounts to avoid detection.
Points
Description
Using precomputed hash tables to reverse-engineer passwords.
Points
Description
Observing someone entering their password.
Points
Description
Capturing network traffic to find unencrypted passwords.
Points
Description
Capturing and reusing a valid data transmission.
Points
Description
Setting up a fake Wi-Fi access point to intercept user credentials.
Points
Description
Accessing RAM after a system shutdown to retrieve encryption keys or passwords.
Points
Description
Using information from physical hardware (like power consumption) to deduce passwords.
Points
Description
Gaining control of a user's phone number to bypass two-factor authentication.
Points
Description
Exploiting weaknesses in file permissions to access stored passwords.
Points
Description
Planting malware via infected USB drives.
Points
Description
Using a plug in hidden hardware device that emulates a keyboard or a mouse to steal authentication information.
Points
Description
Employees or contractors cannot steal the passwords as there is no password to steal.
Points
Description
Monitoring clipboard data for copied passwords.
Points
Description
Using software like John the Ripper or Hashcat to crack passwords.
Points
Description
Guessing or researching answers to security questions.
Points
Description
Using malicious QR codes to direct users to fake login pages.
Points
Description
Setting up fake websites with URLs similar to legitimate ones to capture passwords.
Points