advanced authentication for the way you work
eAgent X2 is a two-factor CJIS compliant advanced authentication solution that protects access to sensitive information. It's unique for its flexibility and it can get you compliant with the FBI CJIS Security Policy mandates fast. Get a free quote today.
flexible and reliable two-factor authentication
Security attacks against government departments have increased dramatically over the last several years.
Some vendors have preyed on our growing security fears by promoting their expensive authentication solutions which often have unnecessary bells and whistles, or were developed for industries like banking and healthcare -- not law enforcement.
eAgent X2 is the answer to these problems. It’s designed to be a secure, yet simple solution that focuses on the core needs of law enforcement agencies. It’s also reasonably priced and easy to implement, saving you and your IT staff valuable time and money.
eAgent X2 was created to be as easy as possible to set up and maintain. With self-serve options for second-factor retrieval, the strain is taken off your IT staff.
Your agency can choose one of four retrieval methods: paper token, key chain fob, text message, or phone app. You can also choose to customize your back-end integrations and set different access levels for delegated user authority.
easy to integrate
X2 integrates with most mobile VPN providers, RADIUS, Active Directory, and LDAP so you don't have to worry about changing the way you work.
If you handle criminal justice information then you need a CJIS-compliance advanced authentication solution -- otherwise you'll get dinged on your next audit. eAgent X2 is compliant with the latest CJIS Security Policy.
The eAgent X2 advanced authentication card system works very well for us. It meets all FDLE requirements, and it was implemented quickly and efficiently by DCI. We are also very happy with customer support. In the time we’ve had eAgent, the system has never been down.
Julio Perez, Hallandale Beach Police department
Frequently asked questions
Does my agency need Advanced Authentication?
Whether or not your agency requires CJIS Advanced Authentication boils down to one key question: Do folks access NCIC criminal justice information from a mobile data terminal or handheld device, or do they have remote access from an unsecure location? If the answer is yes, then those people need an Advanced Authentication system to be compliant.
Is eAgent X2 advanced authentication user-friendly?
Yes! Keeping interfaces user-friendly is what we live for. Our paper tokens are ideal for those who have their cell phones on them at all times. Users who have an iPhone, Android, or Windows phone can have their authentication code sent directly to their device either as a text message or from an authentication app such as Google Authenticator.
How cost-effective is X2?
X2 is unique for its flexibility. It allows you to approach your IT security in the way that fits your agency's particular needs. Being able to provide a method that is convenient for everyone is what makes X2 ideal for agencies of any size.
Is your IT staff frustrated with having to constantly reset passwords or deal with unreliable biometric authentication tools? X2 is so reliable that your IT staff might actually start to get a little lonely.
We also support all of our products personally, so we can take the strain off of your IT staff. Other companies charge extra for support, but our 24/7/365 support is available at no extra cost to you.
How's your customer support?
Can I try eAgent before I buy?
We prefer not to use cell phones for authentication. What can we do?
Many agencies prefer to use a method other than cell phone authentication for secure sign-on. We offer several alternatives for you! One method is a hard token device that generates a one-time password unique to that user each time the hard token is turned on. This token can conveniently be attached to your keychain.
eAgent X2 also has a paper token that you can print out. With the paper token, end-users are asked to locate the authentication code on the card. For example, a user may be told to enter the code that corresponds to “line B, row 7.”