The Issue
Many organizations are discovering that alternatives to passwords are not always practical or cost/risk justified. Without providing a means to enable users to easily comply, even the most carefully conceived security policy often creates more vulnerabilities than it was designed to mitigate.
The Mandylion Approach
For those logins where passwords remain the most viable alternative, Mandylion Labs offers enterprise grade password management tokens which aide in the generation and secure management of all password based login records. A simple office tool that empowers users to comply with complex corporate security policies.
The tokens are “air-gapped” from the desktop and work instantly with any login. The technology was originally designed for network operations centers and administrators of complex LAN/WAN infrastructures. Due to its low cost and ease of use, it is also a great tool for any user who must maintain multiple password protected logins. For the network administrator, it is the only solution that professionally and securely manages root passwords and logins under shared control.
Each token can be customized and pre-configured on behalf of the user or class of users via an intuitive configuration software utility called Policy Master. For security purposes, only the publicly available Login Policy for each login (i.e. length, composition and renewal period) is downloaded to the token. The token does the rest.
Tokens
The Autoload Platform is the next generation of Mandylion’s password management token technology. The Platform consists of Autoload Tokens, Policy Master Configuration Cradles and the Policy Master Configuration Software Suite.
Compliant with Federal Standards
The token has been designed in conformity with U.S. Military, National Institute of Standards and Technology and National Security Agency standards for the secure creation, management and use of passwords. All units comply with DoD information security guidelines D8500.1 and D8500.2; US Army Regulation 25IA; FIPS Pub. Nos. 112,190 and 196 and NIST Special Publication 800-63 titled “ Electronic Authentication Guideline. (9/04); NSA and Committee on National Security Systems (CNSSS) National Security Telecommunications and Information Security Systems Policy No. 11 (NSTISSP #11).
Actual Size: 69mm length (2.7 inches)
42mm width (1.6 inches)
10mm depth (3/8 inch)
Software
Self Launching Application
The Policy Master Utility Software is a self launching and configuring application consisting of following files on the Disk:
- Policy Master Application (Setup.exe)
- Policy Master Manual
- Token ManualToken
- Quickstart Guide
The Mandylion tokens work with any application or operating system which utilizes the durable password as its means for authenticating the user and granting it access privileges. The Mandylion solution was specifically designed to work with and improve the vulnerabilities inherent in the MS LANMANv2 hash and its backward compatibility with previous versions of LANMAN. LANMAN is the central utility used in all MicrosoftOS products to authenticate users and secure their passcodes. The Configuration Management Utility software runs on any Wintel platform including Microsoft Win32 (Windows 98, ME, NT 4.0, 2000, XP).
Template Based
The Policy Master Configuration Software is a template based application. It provides a great deal of “cut and paste” flexibility in creating login records for a single token or multiple tokens for whole classes of users. The basic Policy Master Template screen is shown below. This is the default file which appears on the screen when the application is launched. The template is divided into three logical areas; user information input area; selection of default parameters to the device including locks, alarms and default password g eneration; Login Record Area.
Some of our IT Security clients





