Hawk Browser

  1. How easy is it to set up a browser?
  2. What platforms are supported by the browser?
  3. What happens if a user loses their device?
  4. Can the Hawk Secure Browser be branded or customised for my organisation?

Hawk Server

  1. What hardware is required?
  2. What operating system does the server support?

Hawk Image Passcode

  1. What’s so special about Image Passcode?
  2. Do I have to use an Image Passcode?
  3. How long does my Image Passcode have to be?

Hawk Encryption

  1. What sort of encryption is used to transmit data?
  2. Are passcode details transmitted? 

Hawk Integration

  1. What firewall changes are required?
  2. Does this need a separate VPN?
  3. Do I need to purchase and manage SSL certificates?
  4. Is separate 2-factor authentication supported?

 

Q: How easy is it to set up a browser?
A: Really easy! Just download Hawk Secure Browser for your operating system, install it and enter the details provided by your system administrator or service provider.

 

Q: What platforms are supported by the browser?
A: We are offering a free public beta for Windows 7 & 8, Mac OS X 10.9 Mavericks and above, and Android 4.1 Jelly Bean and above today! Hawk Secure Browser will also be supported on iOS soon. 

 

Q: What happens if a user loses their device?
A: No problem. With the management interface on the Hawk Server, it’s simple to disable a registered Hawk Browser, preventing others from trying to access it. This can be done for a device, so if a user has multiple devices they don't have to change their password if one suddenly does missing. Remember, you need both the right device and the password to access the Hawk Browser, having one but not the other is useless to a theft. 

 

Q: Can the Hawk Secure Browser be branded or customised for my organisation?
A: Absolutely. The Hawk Secure Browser is all about customisation. Please get in touch with our business development team to find out how Hawk Browser can fit around you.

 

Q: What hardware is required?
A: Hawk Server needs minimal hardware for you to try it. A spare server or even your desktop with Virtual Machine software installed. If you plan on securing your enterprise you can get in touch with us for some advice.

 

Q: What operating system does the server support?
A: Hawk Server runs on a Debian Linux distribution 7.6 and above, and Ubuntu Server 14.04 LTS and above. If you run a different OS on your servers, you can download Hawk Server as a VM to run on Windows Server, for example. 

 

Q: What’s so special about Image Passcode?
A: Image passcodes are much easier to remember than multiple, complex passwords and they are much stronger! The clever thing is, we use the digital data of the images to create a long password that could easily be over 100,000 chaacters long! We then digitally alter the images everytime you login. You now have a password that could be over 100,000 characters and changes everytime. There's more! We use this password in combination with a key to encrypt the data. The result is a 100,000+ password that changes eveytime you login, that we don't even transmit!

 

Q: Do I have to use an Image Passcode?
A: Our beta program comes with image passcodes set as the default login method. However, you can select to use a traditional text password when you register the Hawk Browser if you'd prefer.

 

Q: How long does my Image Passcode have to be?
A: They can be as long or as short as you like. As a guide, we recommend choosing between 4 - 6 images. 

 

Q: What sort of encryption is used to transmit data?
A: We use a system of digitally manipulated passwords to allow credentials to refresh while appearing the same to the user. This is used in combination with SRP (IEEE P1363) to authenticate users and generate a shared secret.

The system uses Hash-based Key Derivation Function (RFC 5869) to generate key material from the shared secret.

Traffic is currently encrypted using AES with 128 bit length keys (FIPS 197)
Messages are tamper and replay protected using HMAC-SHA1 (FIPS 198)

 

Q: Are passcode details transmitted?
A: Never! That’s the beauty of Hawk. Despite our communications being encrypted, your passcode is neither stored nor transmitted to the server.

 

Q: What firewall changes are required?
A: We need a few ports opening to allow the Hawk Browser to access the Server. The Server can reside in you DMZ or private network, it just needs access to your webserver. Please consult our user guides for more information.

 

Q: Does this need a separate VPN?
A: Hawk operates without the need for any VPN. However you can still use your VPN if you have one. Hawk will simply work with it!

 

Q: Do I need to purchase and manage SSL certificates?
A: No certificates necessary! Hawk does not use SSL/TLS for it's encryption our certificates for machine authentication. Therefore no additional cost or complex management. If your webservices have certificates in place, Hawk will simply work with them, but we certaintly don't.

 

Q: Is separate 2-factor authentication supported?
A: Yes. Hawk supports standard 2-factor authentication products. If you have those, Hawk will happily work alongside them.