
CORE Identity Security
Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience.
Enterprise Authentication Ease
Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility.
Use Cases
Virtual Enclave for Mobile
Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required.
Virtual Enclave for Desktop
Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership.
PKI & Certificate Protection
Protect machine and human electronic identities and the root certificate authority which oversees them.
Key Features
Central Management and Real Time Tamper-Proof Audit Trail
The CoT server includes a real-time tamper-proof audit log of any cryptographic operations performed on the endpoint (e.g. signing an authentication token, signing a transaction, data decryption). The audit log data can be fed into a SIEM, UEBA, or a risk engine, allowing detection of cryptographic key usage anomalies in real-time.
Brute-Force-Proof Authentication
Optional: Use 2FA to authorize any usage of the cryptographic key. Various authentication factors are supported, including PIN code, password, and native device biometrics such as FaceID, TouchID, and so on. Authentication takes place using the MPC algorithm between the endpoint and the CoT server, thereby preventing brute-force attacks.
Instant Revocation
When a device is suspected as compromised, Unbound CoT allows ultimate control. Ensure
instant revocation of any cryptographic key that is secured with CoT. The deletion of the relevant key share on the CoT server immediately renders the key useless -- preventing any potential key misuse.

See CORE in Action
Learn More

Introducing Unbound CORE: Cryptographic Orchestration Reimagined for the Enterprise
It is with great pleasure that we announce the Unbound CORE platform, our next generation solution offering that delivers comprehensive cryptography orchestration for enterprises. This new offering marks a major s...

More Attacks, Higher Burnout: The Toll of Decentralization on the Cybersecurity Industry
Cybersecurity professionals not only have to worry about the increase in security breaches and attacks that have dominated the news in recent weeks; they must also contend with the persistent feeling of not doing ...
Advance Your Authentication and PKI with CORE
Protecting PII with maximum security, best user experience.
