Authentication Management

SAVANTURE enables you to integrate two factor authentication (2FA) in order to secure your users’ logins and transactions using their smartphones, physical tokens or any SMS-enabled device. For the ultimate in security and cost effectiveness, you can combine the SAVANTURE Secure Authentication Application (TSAA) with the SAVANTURE Authentication Analysis and Alerting Module (TAAAM).

  • SAVANTURE’s Secure Authentication Application (TSAA) – This is a free application to customers of SAVANTURE which is available on all major smartphone platforms, and provide your users an easy way generate passcodes without the cost and hassle of hardware tokens, or any incremental cost of phone calls or text messages which they may incur.  Since most enterprises are trying to support Bring Your Own Device (BYOD), this greatly simplifies usage by only using the data channel of the mobile phone.  SAVANTURE’s Secure Authentication Application supports iPhone, Android, BlackBerry, and Windows Phone allowing a secure exchange of credentials between the 2FA authentication server.
  • SAVANTURE’s Authentication Analysis and Alerting Module (TAAAM) – This is an optional add-on module providing the ability to collect, analyze, and alert on authentication logs produced by each protected application (i.e. VPN concentrator, windows or Linux/Unix server, Exchange, etc).  This is an important ability for most compliance requirements such as HIPAA, PCI, SOX, GLBA, EU and US State Privacy laws, NERC, FISMA, and is a defined best practice in most security standards.  In essence, if somehow a system is compromised due to a bad configuration, backdoor, or and situation where access is provided and a anyone accesses the protected system, the TAAAM will identify that the user was not authorized by the SAVANTURE 2FA system and send a high priority alert (via TSAA, SMS, or phone) to the appropriate professional in your organization. 

SAVANTURE recognizes that not all users have the same technology capabilities and have options to integrate two factor authentication (2FA) in order to secure your users’ logins and transactions using their smartphones, physical tokens, PC or SMS.


For those customers that require traditional 2FA tokens, SAVANTURE also sells and supports hardware tokens. Hardware tokens can be ordered from the Billing section of the administrative interface.


How it Works

First, the user types in their username as usual but substitutes their password with a passcode, which is a combination of the user’s 4 digit PIN plus 6 digit One-Time Password (OTP) generated from their token application or SMS. We make the provided method easy … we understand if you complicate a user’s login that defeats a primary goal of ease of use.   As such, SAVANTURE allows you the flexibility of supporting diverse user base by allowing you to authenticate with whatever method is best for your individual users. Here’s a simple illustration of how it works:

And 3, if your using the SAVANTURE Authentication Analysis and Alerting Module (TAAAM), the login log produced in steps 1 and 2 are logged, matched, and any deviation is alerted on.  In addition, if we identify any suspect activities (i.e. high login failure rate, suspicious user activity, geo-spatial, etc) we will, 4, alert you based on agreed upon processes.


In addition, SAVANTURE understand that each organization has unique deployment needs based on regulatory requirements, user base, current evolution of utilizing outsourced solutions, and cost objectives.  We offer a very flexible suite of deployment options.

Ease of use … and Seamless Integration
SAVANTURE integrates seamlessly into your VPN, web application, or Unix server environment. You can be up and running in less than fifteen minutes since there’s no hardware to install and nothing to distribute to users and deployment is simple. In addition, we provide an easy 2 minute online video focused on educating and training your users on the increased security you are applying to your organization.

Secure & Reliable
SAVANTURE takes security, reliability, and privacy very seriously. When using one of the hosted options, you will be in a SAVANTURE hosted centers which is PCI DSS Level 1- and ISO 27001‑certified, SSAE 16 (previouslySAS70 Type II), and deployed across multiple geographic regions with redundant connectivity and power sources.



SAVANTURE’s suite of cloud based security tools can be purchased through our Genesis5 solution, individually or in any combination.  SAVANTURE provides the same great tools used by our CISOs and staff to you.  The Cloud Managed Security Services (MSS) suite includes:

SAVANTURE delivers the industry’s most advanced cloud based Security-as-a-Service platform which allows you to dramatically simplify your businesses’ approach to governance and security management.  



Today’s enterprises understand the need to have a robust Governance, Risk and Compliance (GRC) and Security Program in place to protect their business processes and information assets. Often however, your company’s limited IT, network, and security staff are constantly dealing with everyday tactical problems rather than creating the high-value IT innovations that your company needs to differentiate itself in this high tech world. What we often find is the customers have a common goal of reducing risk, but have rarely taken the basic steps to inventory systems, applications, network flow, and business transaction dependencies due to their day to day tactical activities.  In order to assist our clients, we integrate technology and automation capabilities within our suite of services, combined with experienced individuals to:

  • accomplish a higher degree of integration out of the box through automated detection, network mapping, inventory creation and traffic flow mapping.  This means we are more effective without depending heavily upon your staff to provide network diagrams, inventory of systems and applications, and general network flow of traffic within a short period of time.
  • Then, we have experienced professionals reviewing the events being collected by the SAVANTURE platform components and tune them to achieve a high degree of accuracy in our alerts.  We continue to provide this level of review to make sure as threats increase, technologies evolve, networks change, and best practices evolve, your defense posture is optimized.
  • When this is combined through the Genesis5 offering, we integrate a transparent delivery model that leverages people, process, and platform together into the industry’s most powerful, cost effective solution.

SAVANTURE is able to provide higher value, lower costs and a set of world class products and services by leveraging our global team of subject matter expertise, geographically localized leadership with each having decades of information risk management experience. 

Product and Services Overview

While our customers benefit from the added “human experience and knowledge” within each product and suite of services, we have taken a much more aggressive approach in integrating a senior security leader into our flagship solution, Genesis5.


    Seamless integration of best practices with technology … Leverage best practices for policy, rule creation, with the support of a virtual team of experts, an industry veteran interface assisting you, combined with the technology integration of SIEM, LMS, VMS, 2FA that is Genesis5.  How do you catch Advanced Persistence Threats?  How about the kids huddled in a garage down the road trying to prove they can hack into your network?  You know it’s not just great technology.  You know it’s not just great people.  And you certainly know it’s not about meeting regulatory requirements and having a governance program in place.  It’s about intelligence on a global scale of what’s happening, what’s likely to happen, where great people are supported by excellent technology and proper programs to support compliance and governance with a clear prioritized plan of execution supported by experienced individuals.  We are Savanture.  We can help.  Gensis5 is that solution that makes it all come together. Read more.

    The foundational cores of our solutions, including Genesis5, are delivered through the following products packages which can be purchase individually, combined or as an integrated suite:

    Security Information and Incident Management (SIEM)

    Real-time analysis and alerting through automated analysis and correlation of event logs, combined with ongoing per customer reviews and analysis, integration with vulnerability scans and new vulnerability threat data, trend, and 3rd party intelligence source creates the most accurate SIEM in the industry.  Unlike any other cloud SIEM, we don’t leave it to you to tune, we do that for you and its included in each Managed SIEM In the Cloud package we provide.  We support this through advanced features rarely found in other SIEMs.  Read more.

    Log Management Service

    Regulatory requirements, forensics, and best practices drive the requirements to retain system and application logs from 1 year to over 7 years.   What is the secret sauce to our success with LMS?  We listened, and continue to listen, to our customers and provide ease of search and reporting thatallows for logical deciphering of useful business intelligence from the millions of reference logs.  While LMS is not intended to be a real-time SIEM, it does also provide some lite features for analysis, alerting and of course reporting.  Our LMS is not built on database technology, but rather a true Big Data platform that provides enhanced search and reporting capabilities like a database but with better performance, cost economies, and scale data structure.  Read more.

    Vulnerability Management Service

    Scan your assets for vulnerabilities regularly and on-demand when new vulnerabilities arise, new assets are added, or to validate fixes.  VMS is a cloud-based suite of security and compliance solutions that automatically integrates with your inventory of network devices, servers and applications, whether Internet perimeter systems or your internal computers. With SAVANTURE’s VMS, you can discover where you have vulnerabilities and weaknesses – and we prioritize the necessary fixes and changes so critical risk issues can be deterred fast before they are exploited. VMS helps you address compliance mandates such as NIST/Government, PCI, HIPAA, FISMA and others that require you to audit the devices and applications on a periodic basis and fix any high priority and critical vulnerabilities, as well as configuration violations. VMS is delivered as a stand-alone product or can be integrated into SIEM.Read more.

    Authentication and Two-Factor Authentication

    Unique to the industry, we provide our SIEM module with most Two-Factor Authentication (2FA) deployments.  Why?  Illegitimate use of legitimate authority, whether accidental or intentional, is a major cause of security breaches.  And this especially applies to Administrator accounts with a high degree of privileged access.   Accountability is a prerequisite of effective security.  Because SAVANTURE 2FA can be deployed to only validate particular applications and user roles (i.e. Administrators), we as an industry must assume that someone could make a configuration error when implementing the service on a server, device or application.  With that understanding, you should actively collect and compare authentication records from each destination system or application with the authentication logs from the 2FA solution … we do that.  If there is a discrepancy, we alert you as a high priority event.  Meet regulatory requirements and provide an easy-to-use, easy-to-implement, second factor authentication solution for your remote user access (such as VPN) to critical systems. Read more.

    Consulting and Professional Services

    Sometimes you need help. We are Savanture.  We can Help. Read more.



We further customize this based on the vertical market in which you operate.  Each industry not only has specific Governance, Regulatory and Compliance requirements, but they often have unique risk tolerances and specific technologies that must be integrated and considered into the overall defensive plan, policy, and risk approach.  We work actively with each customer to create the optimal solution to meet their needs.  We have solution packages that provide specific approaches for each of the following industry segments:


At the heart of our security service is our Security Intelligence and Operations Centers (SIOC), a state-of-the-art facility staffed with a team of engineers, analyst and technicians hand-picked for their network and security management expertise.

Common Platform Characteristics

To provide the highest level of availability and reliability, this facility features the latest advances in building security, surveillance, network redundancy, and power generation and backup. The SAVANTURE SIOCs operate on a continuous 24x7x365 schedule.

Mission critical systems protection and redundancy capabilities include:

  • We follow the same advice we provide our largest enterprise clients when it comes to protecting our own infrastructure:
  • Dual facility and system redundancy
  • 24×7 monitoring of all key network components and servers, including firewalls, intrusion detection systems, routers, VPNs, and more
  • Full logging of all systems
  • Continuous network vulnerability scanning
  • Integrated multi-tier authentication across the platform
  • Quarterly penetration test
  • Infinite Horizontal Scalability to allow us to dynamically add system capacity as more customers and devices leverage our services
  • SSAE 16, previously SAS 70, facilities certification

Learn about our company, read what media and analysts have to say about SAVANTURE, or find open positions and become part of our team. 

We are here to earn your trust, and your business.


  • SAVANTURE Services are best in class and provide the most optimal cost performance solution in the marketplace allowing you to focus on your business
  • Best in class offerings allow us to protect your revenue, reputation and regulatory compliance better than any other solution in the marketplace
  • Flexibility in deployment methods allow a low cost entry option, while breath of services allow you to increase your protection logically over time as threats change and regulatory requirements evolve
  • SAVANTURE allows you to leverage best in class or take advantage of SAVANTURE’s Genesis5
  • Ease of deployment and ease of use while always being cost-effective, reliable, and secure
CONTACT US and we can answer any questions or get you started now.