Multi-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be.
Evolving business needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considerations for access control.
New threats, risks, and vulnerabilities as well as evolving business requirements underscore to the need for a strong authentication approach based on simple service delivery, choice, and future-forward scalability.
Today, organizations are asking:
Can I address new demands of my business — like cloud and mobile devices?
How do I map access control methods to business risk and the needs of my users?
Can I centrally manage, control and administer all my users and endpoints?
Who controls my user data?
How can I incorporate additional security layers to help me further fortify against threats?
And how do I keep it all practical and cost-effective?
More than ever, customers are looking for identity and access management solutions that deliver simplicity, automation, reduced TCO and choice.
Multi-factor authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity. MFA can be achieved using a combination of the following factors: Something You Know – password or PIN. Something You Have – token or smart card (two-factor authentication). Something You Are – biometrics, such as a fingerprint (three-factor authentication). Because multi-factor authentication security requires multiple means of identification at login, it is widely recognized as the most secure method for authenticating access to data and applications. - See more at: http://www.safenet-inc.com/multi-factor-authentication/#sthash.v1jMRqJD.dpuf
SafeNet's multi-factor authentication software delivers the protection you expect, while enabling customers with broader choice, improved visibility, and the ability to expand into the future. As a result, organizations using our MFA software have:
Better self-control of data - SafeNet enables customers with the option to create and control their own token data, so there is no reliance on a third-party vendor
Improved management and visibility – SafeNet's solutions deliver single-server management, providing full control, simple administration, and reduced cost and staff burden
Expanded options – SafeNet delivers the broadest choice when it comes to access security methods – so you can meet the needs of any user and any risk level (hardware or software, certificate-based authentication or traditional one-time-password, on-premise, or into the cloud)
Future-ready solutions - SafeNet provides new solutions that deliver MFA and single sign-on (SSO) for cloud applications as well as credentialing for mobile device management
Painless migrations - SafeNet offers seamless migration to cloud-based authentication, which maintain your existing investments and cause no disruption to end users
Strong authentication refers to systems that require multiple factors for authentication and use advanced technology, such as secret keys and encryption, to verify a user’s identity. The simplest example of is a consumer accessing funds via his or her ATM card. This requires something the user has (their card), and something they know (their PIN). Most people wouldn't want their bank to allow access to their checking account with just one factor.
Yet many organizations allow entrance to their valuable VPN, Citrix, and Outlook Web Access resources (often much more valuable than a single personal checking account) with only one factor—often a weak password. Strong authentication enables organizations to strengthen the protection of these vital resources.
While the decision to use multiple factors for verifying users' identities is clear cut, deciding on an approach is anything but. Today, there are hundreds of options, each presenting its own specific advantages and tradeoffs.
A strong authentication solution that validates the identities of users and computing devices that access the non-public areas of an organization’s network is the first step in building a secure and robust information protection system.
A flexible approach that enables an organization to implement different authentication methods based on different risk levels may ensure a robust system that can be efficiently and cost-effectively deployed.
Technologies for multi-factor authentication include:
Products that are built upon standards-based crypto-algorithms and authentication protocols are preferred. Unlike proprietary algorithms, standards-based algorithms have gone through public scrutiny by industry and security experts that reduces the chance of any inherent weaknesses or vulnerabilities. Moreover, they enjoy broad industry support.
Organizations need to ensure that access to all sensitive information is authenticated, whether the information resides on premise or in the cloud. Organizations should implement the same security mechanisms for cloud resources as they would for remote access to the corporate network. In addition, organizations should deploy security mechanisms to ensure that users accessing network resources from their mobile consumer devices (e.g., tablets, smart phones) are securely authenticated.
Authentication environments have to offer convenience and transparency for end users and administrators alike. Following are several guidelines that can help organizations achieve these goals:
Enterprise Solution Pack
eToken Network Logon
eToken PRO Anywhere
eToken PRO Smart Card
iKey USB 4000
iKey USB 1000
SafeNet Authentication Client
SafeNet Authentication Manager
SafeNet Authentication Manager Express (SAMx)
SafeNet Authentication Service
Data Encryption & Control
KeySecure with Crypto Pack
Hardware Security Modules
Crypto Command Center
Luna PCI-ELuna SA
Luna SPPCI Compliance
High Speed Encryption
CM7 Management Platform
Ethernet Encryptor for SMEsCN6010
Ethernet/Fibre Channel Encryptor
CN6100 10 Gbps Ethernet EncryptorCN8000
Multi-Link Ethernet Encryptor
Fibre Channel Encryption
Security Management Center (SMc)