With MyCena Access Segmentation and Encryption Management (ASEM) solutions

MyCena Dashboard

PROBLEM: Employees control access keys

Cybersecurity is impossible when organizations don’t control their access keys.

When employees make and control company passwords, they can give away their login credentials to criminals in phishing scams.

According to the World Economic Forum, 95% of breaches are due to human error.

Why MyCena?

SOLUTION: Organizations control access keys

MyCena Access Segmentation and Encryption Management (ASEM) is a revolutionary security model that solves the problem of employees making and storing their work passwords.

It removes passwords from the control of employees and put them back under the control of the enterprise.

Using a console, passwords are generated according to specific policies for each system and distributed encrypted to employees.

Since no one sees the passwords, employees can’t lose them or accidentally hand them over in phishing scams.


How MyCena Works

Without infrastructure change, companies use the MyCena console to create strong random passwords like 7D£bShX*#Wbqj-2-CiQS%fRlaf$jWPkQ for all systems and distribute them encrypted to employees, so no one ever knows their passwords.

Thus, employees are completely protected from password phishing and errors via a single, easy-to-manage centralized management platform.


Employees don’t know passwords

Employees have no password to create, remember, see, know or type.

Instead, they:

  • Find their credentials in their MyCena application Bronze, Silver or Gold level.
  • Click to open page & auto-fill encrypted password.


MyCena removes 95% of breaches

Complementing security solutions that aim to detect, protect and mitigate known vulnerabilities, but ultimately cover only 2% of the threats, MyCena ASEM platform provides an additional 95% of coverage by targeting the primary source of breaches, which is human error.

Password Protection in Minutes
Password Protection in Minutes
Password Protection in Minutes

MyCena quickly prevents ransomware

As strong random encrypted passwords are applied to each system individually across the entire enterprise network, even if attackers infiltrate the network via a third-party supply-chain attack, they are contained within one system, plus they can’t travel laterally across an organization’s network, escalate privileges and take over the network. This limits the impact of any breach, minimizes the volume of data that can be stolen or locked, and therefore prevents ransomware.

Password Protection in Minutes

ASEM Is The Opposite Of Single Access

MyCena ASEM model offers huge security advances over the single access model, whether Zero Trust, privileged access management, identity access management, or biometric access, which gamble the entire security architecture on users not getting caught out by phishing scams and AI.

If a single user-made master password or biometric is stolen or lost, it may be game over as criminals only need to open one single access.

Password Protection in Minutes
Password Protection in Minutes
Password Protection in Minutes

MyCena Cuts Password Resets And Training Costs

ASEM saves organizations huge costs by eliminating password resets, which are estimated to cost US$70 per reset by research firm Forrester, password hygiene training as well as password fraud.

For example, a 1,000-employee company can save US$ 39,300 monthly or US$ 471,600 yearly on password resets after the first month of implementing MyCena.

Password Protection in Minutes
Password Protection in Minutes
Password Protection in Minutes

Customer Testimonial


From compliance with LGPD to thwarting brute force attacks

"When we started the project to adapt the company to the LGPD, in the first few months we learned about and adopted the Mycena Security – Business Fortress credential management solution, as we understood that, at that time, having protection of the credentials of assets and systems would make us less vulnerable to attacks and invasions. It was a great surprise to have the result in the first weeks when Microsoft Azure security tools pointed out that some brute force attack attempts were frustrated due to the tool architecture, usability, and strong passwords we achieved when we started adopting Mycena."


Reduction of contractual fines and other financial losses arising from fraudulent actions

"With Mycena we eliminate the sharing of passwords among employees. In other words, we make the environment strong and safe against improper actions; and in cases where such actions occur, we can directly attack the Root cause through the IP monitoring that the solution offers. This is now considered legal evidence for action of just cause, as we were able to prove systemically that the action departed from the employee intentionally. Another detail here is the trust we pass on to our client contractor influencing indirectly the portfolio/volume increase for our EPS. Thus increasing revenue"


Reduction of unproductive hours

“With the use of Mycena we reduced by approx. 95% the pauses and loss of LOG arising from password forgetfulness or excessive unsuccessful attempts. By attacking this reduction, we increased the productive capacity for delivery of the planned work to reach our KPIs.  This directly affects the entire planning process because with greater production capacity we hire a smaller number of people (we reduce the % of unavailability that we put in sizing) and no longer have burden on KPIs, going to the bonus scenario in billing."


Solution to counter rising cyberattacks with COVID-19 Work From Home

" I assumed the position of responsible for the company's technical area at the peak of the pandemic. All of our home-office employees were remotely accessing the server, with all access centralized being fast and convenient, until we started having out-of-hours access attempts from unidentified addresses. That's when the need arose for a tool to segmented access  this user information and increase our security. With MyCena I can have total control over the accesses and passwords of each user, facilitating the identification of access and password control in a single portal, in addition to the reports that we can extract quickly and conveniently.”

Ask for a demo

Contact us
Ask for a POC

As seen in...

Subscribe To Newsletter