*The price is based on software tokens. Get more detail about other tokens here
There is a new model in the range of Protectimus' hardware OTP tokens. Meet - Protectimus Crystal! It’s a small stylish hardware TOTP token, which looks like a key fob. The token comes with a pre-installed secret key. You can connect Protectimus Crystal to Protectimus two-factor authentication service or use it with a third-party MFA solution. This OTP token has a 6-digit LCD display, the one-time passwords' lifetime is 60 seconds, but when ordering from 500 pcs. you can choose Protectimus Crystal tokens with a 30-seconds OTP lifetime. The token is dust and water resistant. To place the order, please, contact sales@protectimus.com. OTP tokens Protectimus Crystal are available for order from 1 piece.
2018-11-01
Protectimus offers a new way to deliver OTP passwords - chatbots in instant messengers Facebook Messenger, Telegram, and Viber. We wanted to make two-factor authentication convenient, modern, affordable and as secure as possible. And we found such a solution! Delivery of OTP passwords via instant messaging is just as convenient as SMS authentication, but it is much safer and more profitable for our customers. Protectimus bots in Messenger, Telegram, and Viber support all OATH one-time passwords generation algorithms (HOTP, TOTP, OCRA) and the data signing function CWYS (Confirm What You See). The list of supported messengers will constantly expand.
2018-03-23
Protectimus product line became even wider - now it includes two-factor authentication solution for protecting user accounts and remote desktops in Windows. Our 2FA solution is developed for providing access protection for computers running Windows 7, 8, 8.1 and 10, as well as for protecting remote access to corporate desktops through a connection to a terminal server Windows Server 2012/2016 over RDP. Protectimus 2FA solution for Microsoft RDP and Windows Logon is suitable for both corporate and personal use. Setting up takes up to 15 minutes and does not require special knowledge, detailed instructions and installer are available here.
2018-01-15
Perhaps, your usual single password authentication is not enough? Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password. With computers replacing half of the humans’ occupations in 20 years, we have to be ready for new threats. Complex for violators multifactor authentication is the least you can do to protect your business life.
There are different ways to secure data, starting from old-fashioned methods and ending with multi factor authentication software implementation. A person can use a simple paper notebook to collect all vital data. Or, you can create new passwords every day. Thus, you maintain an authentication, but risk to forget or mix-up service login authorization information. Mobile apps are also often used to protect data by keeping all necessary info for services, where strong authentication is required. But if the application password is broken, all crucial data gets easily leaked.
If you want to add advanced and robust user’s authorization features to your site, you can use a two factor user authentication service. This is a great and the only way to add two factor security to your site without investing in hardware, a team of administrators, load balancing, and other infrastructure-related things. Your users can benefit from the increased security of two step sign in process, and you don't have to go through a dramatic increase in costs. The SaaS-based solution is ready to get up and running.
Today, user authentication software is implemented everywhere. This is why we can say the following statement about two step verification: you can enable two factor authentication in every project of a great importance, web-site, database, transaction signing, any system that uses login and password. Best 2 factor authentication feature is that you get a more secure software authentication, using simple instruments and affordable solutions. Protectimus makes two factor authentication system work for your security needs and profit.
If you want to enable two factor authorization for your growing site, all you need to do is select the auth service that's best for you. Whether you prefer cheap two factor authentication solutions or require advanced multi factor security features, Protectimus is always able to protect your important data.
Our two factor authentication products let you pay as you use the service and deactivate the dual authentication plan at any time, as you implement changes to your site.
Running a business is always a risk. You can count different risks, however one rarely thinks of a probability for the important data to be lost. But if you do, how much would the data security trouble cost? You can think about 2 step verification for your project users as a way to protect your data and avoid certain risks. At Protectimus, you can get a truly affordable two step security service. The prices are evidently reasonable and cheaper than among other services. See our ‘Prices’ page to compare prices for authentication software services worldwide and choose what is best for you.
Today, we should not underestimate corporate culture. Although there are many people thinking corporate culture is a myth, being a part of something bigger than just a job makes a workers’ loyalty. Even remote workers can appreciate a corporate expression of a high regard. You can fulfill two tasks with Protectimus: give your employees a sign of courtesy and ensure they get a 2 step verification password with a branded hardware token. It takes more time for such tokens to be delivered, however the result can be worth trying. Contact our support for more details.
When you find out what is 2 factor authentication and why 2 factor authentication is essential for your personal or/and business needs, it is high time to choose the best security software provider. At Protectimus, we offer the most applicable solutions. Our tokens are diverse and are programmed to let you and your collaborators get 2 step verification code in the most effective way. Our customers enjoy prominent security solutions, user-friendly interface, additional features, tools and service’s loyalty. We know that security matters. Getting your data double-protection is the best benefit.
Modern methods, such as 2 factor authentication products, allow doing less, but getting an upscale security level. Two step verification is probably the best way to keep your data safe. Wrapping all time-tested methods in an up-to-date form is what a 2 factor authentication token is. With Protectimus, you get unlimited one-time passwords for the best data protection.
Two factor authentication, also sometimes referred to as multi factor authentication or two step authentication, is a strong user authentication method required a combination of “something you know” and “something you have”. Usually the process involves a password, and a 2 step verification code obtained from a physical or a software token. A simple example of 2 way authentication is a credit card. Plastic card itself is a something you have, while the PIN code is a 'password' that you know. We cannot say this security mechanism is the best multi factor authentication approach, though.
Protectimus programmers and engineering team has developed various token models for getting a 2 step authentication service. There are several free options, adjustable to small business or companies with remote workers, such as Protectimus SMART and Protectimus MAIL. If you are seeking for convenient, simple, familiar to users solution, then Protectimus SMS can be your inalienable second factor authentication tool. Three Protectimus top-notch hardware token models - ONE, ULTRA, SLIM - give your company access to most functional and reliable 2 factor security solutions.
Workflow management and content management system
Building innovative cloud based products for public sector
Reliable solutions and services for homeland security
Online payments without bank account or credit card info
Data center services and IP Connections
Recommendations for tariffs for mobile phone, Internet, TV, etc.
World famous manufacturer of cosmetics and fragrance
Miami-Dade State Attorney main office
Web hosting, outsourcing, and co-location services
Solution for real-time chat and online customers support
IT solutions to the leisure entertainment and cultural markets
College of Central Florida
Internet connectivity to local, national & global businesses
Business intelligence and database solutions development
Financial technologies: personal loans, mortgage, credit cards
Online games development and operating
Data management platform, Big Data analysis
Credit, check discounting, factoring, and credit card reconciliation services
Health care insurance and income protection
London Science Museum
GPS location and activity tracking for dogs and cats
Provider of industrial hardware, cabinet and door hardware
Online casino, sports bets, and multiplayer poker
Internet applications and information systems development
Banking services, loans, mortgages, leasing
Co-location, backup, complete IT operation, and document storage services
Online money transfer services, easy transfers over seas
Software engineering, web design, user experience design
Cloud solutions and services for backup, disaster recovery, and data storage
Design and networks installation, information security, support and IT оutsourcing
Voice over IP services specializing in Africa, Middle East & Asia Countries
Domestic and international business payments, efficient cash management, fraud detection
Thailand Bitcoin Exchange
Healthcare systems integration and automation
Canadian Bitcoin Exchange
Universal payment system: bank transfers, multi-currency accounts, virtual and plastic cards
Payment acceptance system: online payment through terminals, bank cards, sms
Physical therapy billing and Electronic Medical Records solution
The leading network of hypermarkets in Russia