Frequently asked questions
Does my agency need Advanced Authentication?
Whether or not your agency requires CJIS Advanced Authentication boils down to one key question: Do folks access NCIC criminal justice information from a mobile data terminal or handheld device, or do they have remote access from an unsecure location? If the answer is yes, then those people need an Advanced Authentication system to be compliant.
Is eAgent X2 advanced authentication user-friendly?
Yes! Keeping interfaces user-friendly is what we live for. Our paper tokens are ideal for those who have their cell phones on them at all times. Users who have an iPhone, Android, or Windows phone can have their authentication code sent directly to their device either as a text message or from an authentication app such as Google Authenticator.
How cost-effective is X2?
X2 is unique for its flexibility. It allows you to approach your IT security in the way that fits your agency's particular needs. Being able to provide a method that is convenient for everyone is what makes X2 ideal for agencies of any size.
Is your IT staff frustrated with having to constantly reset passwords or deal with unreliable biometric authentication tools? X2 is so reliable that your IT staff might actually start to get a little lonely.
We also support all of our products personally, so we can take the strain off of your IT staff. Other companies charge extra for support, but our 24/7/365 support is available at no extra cost to you.
How's your customer support?
Can I try eAgent before I buy?
We prefer not to use cell phones for authentication. What can we do?
Many agencies prefer to use a method other than cell phone authentication for secure sign-on. We offer several alternatives for you! One method is a hard token device that generates a one-time password unique to that user each time the hard token is turned on. This token can conveniently be attached to your keychain.
eAgent X2 also has a paper token that you can print out. With the paper token, end-users are asked to locate the authentication code on the card. For example, a user may be told to enter the code that corresponds to “line B, row 7.”