Multi-Factor Authentication Portfolio

Multi-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. 

Evolving business needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considerations for access control.

Authenticationportfolio 230x230

The Need for Multi-Factor Authentication

New threats, risks, and vulnerabilities as well as evolving business requirements underscore to the need for a strong authentication approach based on simple service delivery, choice, and future-forward scalability.

Today, organizations are asking:

  • Can I address new demands of my business — like cloud and mobile devices?

  • How do I map access control methods to business risk and the needs of my users?

  • Can I centrally manage, control and administer all my users and endpoints?

  • Who controls my user data?

  • How can I incorporate additional security layers to help me further fortify against threats?

  • And how do I keep it all practical and cost-effective?

More than ever, customers are looking for identity and access management solutions that deliver simplicity, automation, reduced TCO and choice.

- See more at:

Multi-factor authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity. MFA can be achieved using a combination of the following factors: Something You Know – password or PIN. Something You Have – token or smart card (two-factor authentication). Something You Are – biometrics, such as a fingerprint (three-factor authentication). Because multi-factor authentication security requires multiple means of identification at login, it is widely recognized as the most secure method for authenticating access to data and applications. - See more at:

SafeNet's multi-factor authentication software delivers the protection you expect, while enabling customers with broader choice, improved visibility, and the ability to expand into the future. As a result, organizations using our MFA software have:

  • Better self-control of data - SafeNet enables customers with the option to create and control their own token data, so there is no reliance on a third-party vendor

  • Improved management and visibility – SafeNet's solutions deliver single-server management, providing full control, simple administration, and reduced cost and staff burden

  • Expanded options – SafeNet delivers the broadest choice when it comes to access security methods – so you can meet the needs of any user and any risk level (hardware or software, certificate-based authentication or traditional one-time-password, on-premise, or into the cloud)

  • Future-ready solutions - SafeNet provides new solutions that deliver MFA and single sign-on (SSO) for cloud applications as well as credentialing for mobile device management

  • Painless migrations - SafeNet offers seamless migration to cloud-based authentication, which maintain your existing investments and cause no disruption to end users

- See more at:

Strong authentication refers to systems that require multiple factors for authentication and use advanced technology, such as secret keys and encryption, to verify a user’s identity. The simplest example of is a consumer accessing funds via his or her ATM card. This requires something the user has (their card), and something they know (their PIN). Most people wouldn't want their bank to allow access to their checking account with just one factor. 

Yet many organizations allow entrance to their valuable VPN, Citrix, and Outlook Web Access resources (often much more valuable than a single personal checking account) with only one factor—often a weak password. Strong authentication enables organizations to strengthen the protection of these vital resources.

While the decision to use multiple factors for verifying users' identities is clear cut, deciding on an approach is anything but. Today, there are hundreds of options, each presenting its own specific advantages and tradeoffs.

- See more at:

A strong authentication solution that validates the identities of users and computing devices that access the non-public areas of an organization’s network is the first step in building a secure and robust information protection system.

1. Match Your Authentication Solution to Your Business, Users, and Risk

Blue Authentication Token Icon

A flexible approach that enables an organization to implement different authentication methods based on different risk levels may ensure a robust system that can be efficiently and cost-effectively deployed.

Technologies for multi-factor authentication include:

    • One-Time Passwords (OTP): OTP technology is based on a shared secret or seed that is stored on the authentication device and the authentication backend. This method ensures authentication by generating a one-time passcode based on the token’s secret.


    • Certificate-based Authentication (CBA): This method ensures authentication using a public and private encryption key that is unique to the authentication device and the person who possesses it. CBA tokens can also be used to digitally sign transactions and to ensure non-repudiation. SafeNet delivers certificate-based authentication via USB tokens and smart cards.


  • Context-based Authentication: Context-based authentication uses contextual information to ascertain whether a user’s identity is authentic or not, and is recommended as a complement to other strong authentication technologies. In order to develop a robust authentication solution, organizations should consider their business, users, and risk, and select a solution that provides them with the flexibility to adapt as needed. For example, if organizations are interested in implementing additional security solutions that rely on PKI technology, such as full-disk encryption, network logon, and digital signatures, or are thinking about adding such solutions in the future, they should consider CBA, as it enables these applications.


2. Prefer Solutions That Adhere to Standards-Based Security and Certifications


Products that are built upon standards-based crypto-algorithms and authentication protocols are preferred. Unlike proprietary algorithms, standards-based algorithms have gone through public scrutiny by industry and security experts that reduces the chance of any inherent weaknesses or vulnerabilities. Moreover, they enjoy broad industry support.

3. Consider All Access Points

Green Secure Remote Access Icon

Organizations need to ensure that access to all sensitive information is authenticated, whether the information resides on premise or in the cloud. Organizations should implement the same security mechanisms for cloud resources as they would for remote access to the corporate network. In addition, organizations should deploy security mechanisms to ensure that users accessing network resources from their mobile consumer devices (e.g., tablets, smart phones) are securely authenticated.

4. Ensure the Solution Reduces IT Administrative and Management Overhead

Multi-Factor Authentication Purple Icon

Authentication environments have to offer convenience and transparency for end users and administrators alike. Following are several guidelines that can help organizations achieve these goals:

    • Administrative Controls: Administrators need to be able to manage all users across all devices and resources. To meet this charter, they need automation, central management, and visibility into user access across multiple resources. To ensure users have an optimal experience, administrators need to be equipped with granular controls and comprehensive reporting capabilities.


  • End-User Convenience: To ensure security controls are enforced, while streamlining user access, organizations should have the ability to offer users the type of authentication device that most suits their role and security profile. Organizations can offer their users several authentication methods, ranging from context-based authentication, through SMS, phone tokens or hardware tokens – ensuring user acceptance and compliance with corporate security policies.

- See more at:

Multi-Factor Authentication

Enterprise Solution Pack

eToken 4100

eToken 5100

eToken 5200

eToken Network Logon

eToken NG-OTP

eToken PASS

eToken PRO

eToken PRO Anywhere

eToken PRO Smart Card

eToken SDK

eToken Virtual

Gold OTP

iKey USB 4000

iKey USB 1000


SafeNet Authentication Client

SafeNet Authentication Manager

SafeNet Authentication Manager Express (SAMx)

SafeNet Authentication Service

SmartCard 400

- See more at:

Data Encryption & Control


KeySecure with Crypto Pack





SecureTokenization Manager

Virtual KeySecure

- See more at:

Hardware Security Modules

Common Criteria

Crypto Command Center

FIPS 140-2

IdenTrust Compliance

Luna EFT

Luna G5

Luna PCI-ELuna SA

Luna SPPCI Compliance

ProtectServerView PIN+

- See more at:

High Speed Encryption

CM7 Management Platform

CN1000 Mutli-Protocol




Ethernet Encryptor for SMEsCN6010

Ethernet EncryptorCN6040

Ethernet/Fibre Channel Encryptor

CN6100 10 Gbps Ethernet EncryptorCN8000

Multi-Link Ethernet Encryptor

Ethernet Encryption

Fibre Channel Encryption

Security Management Center (SMc)

SONET Encryption

- See more at:

There are no reviews for this product.
Write a review
Verification code *
Captcha Image
Reload image challenge
Facebook comment

Keyword Search

Newsletter signup

Subscribe to our mailing list
* indicates required
By subscribing you accept our

This Site

Webstore menu