Deploy keyless access that’s secure without being burdensome.
Proxy was designed and built with security in its DNA because it is fundamental to what we do. We live in a time that abounds with risks in both the physical and digital world. In the physical world we use things like keys, fobs, cards, badges, and in the digital world we use passwords, pins, and codes to represent our credentials. But all of these are only as good as their fundamentals. Keys, cards, and badges can be cloned, passwords can be shared, guessed, or stolen, pins and verification codes can be phished. We believe this separation is artificial and are dedicated to providing our customers and users comprehensive protection across both realms.
Proxy’s patent-pending Universal Identity technology removes the need to trust personal devices and wireless communication channels through the combined use of tokenization and encryption.
Tokenization is the process of protecting sensitive data by replacing it with an algorithmically generated number called a token, and it is commonly used to protect sensitive information. Your Proxy Signal, emitted via Bluetooth from your smartphone, transmits your identity to other Proxy devices through randomly generated tokens which can be authenticated and verified by the receiver. These tokens can be stored on personal devices or passed through various insecure networks such as Bluetooth, without your personal information ever being exposed.
Proxy tokens can also carry additional payload in a uniquely encrypted, one-time, authenticated vault, enabling offline verification while keeping the payload safe from eavesdroppers.
Proxy complies with enterprise security and privacy requirements, such as SOC-2 and GDPR, and works with external auditors to ensure the highest grade of security is met and adhered to.
Proxy regularly audits and tests its cross-functional security practices.
Proxy believes in the self-sovereignty of personal data.
Proxy is committed to helping our users understand their rights and our obligations under the General Data Protection Regulation (GDPR) and other upcoming laws. We have introduced tools and processes, such as collecting explicit consent, to ensure our compliance with the requirements and to help our customers comply with these important regulations as well.Privacy
At Proxy, we practice security in depth and apply best practices to keep your data and our systems safe.