Use your smartphone for secure authentication, next-gen logins and more.
Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection.
Everyone have a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure.
Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction.
You must authorize the use of keys with a biometry such as fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe.
Passwords are dead.
People have to remember long passwords, and they have to change them frequently.
We believe that there is a simpler way how to login: a smartphone.
Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
With Keyote, I use my iPhone as a security token, to generate and store my SSH private keys for a production servers that I and my team have to manage. I love to use Face ID to complete my SSH login.
- Software Developer
After few days of using Keyote for authorizing my commits to a GitHub, I already developed habit to reach out to my phone and confirm the pull request by my fingerprint.
- CEO & Chairman of the Board, O2 Czech Republic
We use TeskaLabs’ technology in O2 Czech Republic in several key areas.
Windows (under construction)
Linux (under construction)
Android (under construction)
Local network (zeroconf/Apple Bonjour/Avahi)
Bluetooth (under construction)
Internet (secure bouncer server)
Central Key Management (PKI)
Remove key wipe