Multi-factor

Authentication

 

 

 

 

 

 

Authentication and Access Management

Enabling Trusted Access to Your Enterprise Data, Resources, and Applications

 

 

Deliver Access to the Right User to the Right Things at the Right Time

While it’s a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it’s also imperative that enterprises are able to maintain their security. It’s a constant challenge to provide different users access without opening themselves up to increasingly sophisticated and frequent threats.

 

Authentication is a fundamental element of any security strategy. It helps establish trust in a user’s identity, so they can gain appropriate, secure access to corporate resources. However, not all authentication solutions are alike. To be effective, the solution needs to:

 

  •   deliver multiple authentication methods
  •   support a variety of users, both internal and external
  •    support many types of devices, both managed and unmanaged 
  •    protect a variety of resources, including applications - both in-house and cloud-data, and infrastructure

 

Enterprises need a solution that delivers the flexibility to balance convenience with security and cost.

 

ActivID Authentication Solution for Financial Institutions

  • Increase security – Decreases risks with robust two-factor authentication.
  • Enhance user convenience – Multi-layer authentication that addresses user demands for convenience and portability.
  • Increase productivity – Securely connects users from any location through a variety of devices and authentication methods.
  • Lower cost – Versatile, future-proof authentication platform reduces the cost of fulfillment and management.
  • Extend value – Enables secure access from smartphone, tablet, laptop and VPNs, web portals and cloud application

 

ActivID Authentication protects corporate, financial and government organizations with risk  appropriate and cost effective user authentication that goes beyond passwords. This  solution ensures a convenient experience for end-users accessing sensitive resources from anywhere in the world, while using virtually any device, including their own smart phones, tablets or computers. Deployment is simple, as the platform is already integrated with major cloud apps, VPN systems, application servers and other third party systems.The ActivID Authentication Appliance enables organizations to tailor authentication methods to the needs of specific groups of users, providing each with the right balance of security, cost and convenience necessary to meet their business objectives, as well  as ensure regulatory compliance and policy adherence.

 

It also supports the broadest range of authentication methods, from strong passwords to certificate-based authentication, including two-factor OATH- standards-based hardware tokens, soft tokens, device forensics, SMS Out-of-Band One-Time Password (OTP) options and push-based authentication with mobile notifications.The ActivID Authentication Appliance also supports HID Approve - our next- generation two-factor authentication solution that combines the security of public key-based cryptography with the convenience of mobile push notifications. HID Approve delivers a simple and secure way for users to authenticate and verify their transactions. Available as either a hardware or virtual appliance, ActivID Authentication Appliance helps to reduce costs with easy installation, worry-free tokens that last up to eight years, and simple integration into an organization’s existing network infrastructure.

 

Features:

  • Interoperability with HID Approve for push-based authentication with mobile notifications
  • Organization-wide authentication solution with fine-grained authentication policies.

  • Easily integrates with applications to leverage strong authentication.

  • Digitally signed and sequenced audit logging and policies.

  • Secure, highly scalable (from 100s to millions), resilient architecture.

  • Security Domains provide strong segregation between different user populations.

  • Works concurrently with legacy authentication servers for graceful and efficient migration.

  • Integrates with Active Directory and most standard LDAP  to match the scalability and availability of the organization’s network (can be

    deployed with internal database when there is no existing LDAP).

  • Organizations can generate their own seed files.

  • On-premise deployment to give organizations complete control over their data and environment

  • Tokens auto-synchronize to reduce support calls

  • Integrates seamlessly with full suite of credential management, middleware, smart card, single sign-on, mobility and physical access control offerings

  • Secure an organization's keys by optionally connecting to a FIPS 140-2 network  HSM.