From Tactical to Practical. Enterprise grade
password management tokens with a U.S. Military
pedigree. Mandylion technology was matured under a
Department of Defense research program seeking
practical solutions to a modern warfighter's problem: password overload. The solution? An
uncannily simple, inexpensive keychain sized token
which aids in the generation and secure management
of any password based login record.
Computer Week Review
Leading Federal and State IT Publication reviews
Mandylion’s next generation token and states its
“ready for enterprise deployment”
Wall Street Journal Review
WSJ article provides overview of how corporations are coping
with password overload and favorably describes the Mandylion Token
as the hardware token solution.
Military Information Technology Magazine
Respected Military Journal Reviews DoD program
which matured Mandylion token technology.
Civilian Agencies Deploy
The Commerce Department’s National Weather Service,
Treasury’s Bureau of Alcohol, Tobacco, Firearms &
Explosives and the National Institutes of Health
Deploy tokens. more info
DoD Funds Development
Mandylion Labs technology was matured and showcased
as part of a 3 year Advance Concept Technology
Development and Demonstration Project funded by DoD
Advanced Systems and Concepts. more info
|How Much Are Passwords Costing You?Forget
about the security aspects of passwords. For a
moment, focus on their costs to your organization.
That’s right, their direct and recurring costs to
your organization. Although they appear free,
passwords cost your organization a material portion
of its IT support budget. more info
Manages Up to 50 Login Records Simultaneously
Generates Cryptographically Strong Passwords
Complies with All DoD, Govt. & Industry Password
Manages Root and Group Passwords
Approved, Trusted Technology; Recoverable
Enterprise Grade - Pre-Configurable for User
Multi-Layer, Defense-in-Depth Approach
A Password Security Policy & Compliance Management
Sarbanes-Oxley Compliance? Gramm Leach Bliley? HIPAA? FACTA? FISMA?
Regulations now mandate reporting on controls that
safeguard the enterprise’s computing systems. Merely having a policy in place is no longer adequate.
Management and Governmental entities must now
certify that these policies and controls are also
How Strong Are Your Passwords?
Security experts cite weak passwords
as one of the most critical security
threats to your infrastructure. But just
what is a strong password? Are their tools
that can help me audit and quantify my risk?