Over the past years, we’ve had only positive cases of working together. Protectimus helped us at every stage, from integration to adding additional features that solved our specific tasks. Using Protectimus, we are confident that Advcash infrastructure and users are well protected. Protectimus gives us what money can’t buy – not a sense of security, but REAL security. I highly recommend it for implementation.
At the moment, my assessment of the company’s work is 10 out of 10. An important factor in choosing this two-factor authentication provider was the possibility of customizing the 2FA system for our project. After we got in touch with the Protectimus team and explained the task, they implemented the necessary functionality for us free of charge. There were no problems. Everything works well.
Protectimus was chosen because of their unique Dynamic Strong Password Authentication (DSPA) technology. Using this product, we added 2FA to all the systems we needed to protect in one fell swoop, as it allowed us to integrate two-factor authentication services straight with Active Directory. We have been using the Protectimus two-factor authentication platform for a year and are satisfied with this product.
A new Protectimus OWA 2FA installer is now available on the website. It enables two-factor authentication for Outlook Web App (OWA) and Exchange Admin Center (EAC).
Now with the updated Protectimus 2FA solution for Outlook Web App (OWA), you can: protect access to both OWA and the Exchange Admin Center; configure group policies during installation - activate two-factor authentication only for the selected AD group; set the frequency with which users will enter one-time passwords to continue working with OWA (for example, once every 12 hours); use OCRA tokens for OWA and EAC two-factor authentication.
Find instructions for installing and configuring the Protectimus OWA 2FA solution here.
In support of Ukrainian companies that continue to work in hard wartime, we would like to announce that every Ukrainian company registered in the Protectimus two-factor authentication system starting from February 24, 2022, can use Protectimus products for free until the end of martial law in Ukraine. The list of products available to Ukrainian companies for free includes Protectimus Cloud Service, Protectimus On-Premise Platform, and software tokens Protectimus Smart OTP, Protectimus Bot, and Protectimus Mail. The number of users is not limited. Protectimus integration components, API, SDK, and help with implementing two-factor authentication are always provided for free. In wartime, cybersecurity issues come forward. Two-factor authentication will help companies in Ukraine better protect their employee and user accounts from hacking. To activate a special free plan, please, contact our support team.
Recently, we have received many requests asking whether the Protectimus Two-Factor Authentication System is safe from the CVE-2021-44228 critical vulnerability found in the Apache Log4j2 library (CVSS severity score 10 out of 10). Dear Protectimus users, kindly be noted that the CVE-2021-44228 vulnerability cannot affect the operation and safety of the Protectimus Cloud Service in any way. Please, keep calm, you can safely use our products. For more information about the CVE-2021-44228 vulnerability, visit the National Institute of Standards and Technology website.
Perhaps, your usual single password authentication is not enough? Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password. With computers replacing half of the humans’ occupations in 20 years, we have to be ready for new threats. Complex for violators multifactor authentication is the least you can do to protect your business life.
There are different ways to secure data, starting from old-fashioned methods and ending with multi factor authentication software implementation. A person can use a simple paper notebook to collect all vital data. Or, you can create new passwords every day. Thus, you maintain an authentication, but risk to forget or mix-up service login authorization information. Mobile apps are also often used to protect data by keeping all necessary info for services, where strong authentication is required. But if the application password is broken, all crucial data gets easily leaked.
If you want to add advanced and robust user’s authorization features to your site, you can use a two factor user authentication service. This is a great and the only way to add two factor security to your site without investing in hardware, a team of administrators, load balancing, and other infrastructure-related things. Your users can benefit from the increased security of two step sign in process, and you don’t have to go through a dramatic increase in costs. The SaaS-based solution is ready to get up and running.
Today, user authentication software is implemented everywhere. This is why we can say the following statement about two step verification: you can enable two factor authentication in every project of a great importance, web-site, database, transaction signing, any system that uses login and password. Best 2 factor authentication feature is that you get a more secure software authentication, using simple instruments and affordable solutions. Protectimus makes two factor authentication system work for your security needs and profit.
If you want to enable two factor authorization for your growing site, all you need to do is select the auth service that’s best for you. Whether you prefer cheap two factor authentication solutions or require advanced multi factor security features, Protectimus is always able to protect your important data. Our two factor authentication products let you pay as you use the service and deactivate the dual authentication plan at any time, as you implement changes to your site.
Running a business is always a risk. You can count different risks, however one rarely thinks of a probability for the important data to be lost. But if you do, how much would the data security trouble cost? You can think about 2 step verification for your project users as a way to protect your data and avoid certain risks. At Protectimus, you can get a truly affordable two step security service. The prices are evidently reasonable and cheaper than among other services. See our ‘Prices’ page to compare prices for authentication software services worldwide and choose what is best for you.
Today, we should not underestimate corporate culture. Although there are many people thinking corporate culture is a myth, being a part of something bigger than just a job makes a workers’ loyalty. Even remote workers can appreciate a corporate expression of a high regard. You can fulfill two tasks with Protectimus: give your employees a sign of courtesy and ensure they get a 2 step verification password with a branded hardware token. It takes more time for such tokens to be delivered, however the result can be worth trying. Contact our support for more details.
When you find out what is 2 factor authentication and why 2 factor authentication is essential for your personal or/and business needs, it is high time to choose the best security software provider. At Protectimus, we offer the most applicable solutions. Our tokens are diverse and are programmed to let you and your collaborators get 2 step verification code in the most effective way. Our customers enjoy prominent security solutions, user-friendly interface, additional features, tools and service’s loyalty. We know that security matters. Getting your data double-protection is the best benefit.
Modern methods, such as 2 factor authentication products, allow doing less, but getting an upscale security level. Two step verification is probably the best way to keep your data safe. Wrapping all time-tested methods in an up-to-date form is what a 2 factor authentication token is. With Protectimus, you get unlimited one-time passwords for the best data protection.
Two factor authentication, also sometimes referred to as multi factor authentication or two step authentication, is a strong user authentication method required a combination of “something you know” and “something you have”. Usually the process involves a password, and a 2 step verification code obtained from a physical or a software token. A simple example of 2 way authentication is a credit card. Plastic card itself is a something you have, while the PIN code is a ‘password’ that you know. We cannot say this security mechanism is the best multi factor authentication approach, though.
Protectimus programmers and engineering team has developed various token models for getting a 2 step authentication service. There are several free options, adjustable to small business or companies with remote workers, such as Protectimus SMART and Protectimus MAIL. If you are seeking for convenient, simple, familiar to users solution, then Protectimus SMS can be your inalienable second factor authentication tool. Three Protectimus top-notch hardware token models – ONE, ULTRA, SLIM – give your company access to most functional and reliable 2 factor security solutions.