• en
    • fr
    • de
    • ru
    • es
  • How it works
  • Solutions
  • Tokens
  • Pricing
  • Features
  • Docs
  • Support
  • FAQ
  • Privacy policy
  • Terms of Use
  • Partners program
  • Corporate Customer
  • Contact Us
  • Blog
  • Support
  • FAQ
  • Privacy policy
  • Terms of Use
  • Partners program
  • Corporate Customer
  • Contact Us
  • Blog
    • en
    • fr
    • de
    • ru
    • es
  • How it works
  • Solutions
  • Tokens
  • Pricing
  • Features
  • Docs

Log In

Sign Up
  • 2FA Authentication Service

    Our multi-factor authentication solution
    is powerful and flexible, and scales to
    meet the needs of any business.

    OVERVIEW
    DEMO
    VIDEO
    bulletproof authentication

    For payment and banking systems, healthcare, and corporate security

    bulletproof authentication
  • Software tokens
    Protectimus proposes all possible ways of OTP delivery
  • Hardware tokens
    Protectimus supports all OATH-compliant tokens
sign up and get 25$ free access
Get started
  • Cloud-Based 2FA Service
    Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin
  • Easy Integration
    Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development
  • On-Premise 2FA Platform
    The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Pay the multi-factor authentication platform monthly or purchase a lifetime license.
Our clients
Online payments without bank account or credit card info
The world’s leading provider of enterprise open source solutions
The world’s largest supplier of athletic shoes, apparel and a sports equipment
Universal payment system: bank transfers, multi-currency wallets, virtual & plastic cards
Video game company operates across more than 20 offices globally
The United Nations Entity for Gender Equality and the Empowerment of Women
World famous manufacturer of cosmetics and fragrance
Middle Tennessee State University is a public university in Murfreesboro, Tennessee
our news

Protectimus Flex: Programmable TOTP Tokens That Look Like Key Fobs

We are launching the sale of a new model of programmable hardware TOTP tokens - Protectimus Flex. Protectimus Flex security tokens are made in the form of keyfobs, and this is their main difference from the popular Protectimus Slim NFC. A key fob is a perfect design for an OTP token. Users attach keyfob tokens to their keychains, which makes it less likely that they lose or forget the device at home or work. To flesh the seed into the TOTP token Protectimus Flex, you need an Android phone supporting NFC. Note that one token can store one seed up to 32 characters long in Base 32. Programmable OTP tokens can be connected not only to the Protectimus multi-factor authentication service but almost to any website that supports MFA applications.


2020-11-02

Windows Two-Factor Authentication Works Offline Now

A new version of the Protectimus Winlogon component with backup codes function is already released and available on the site. Backup codes allow users to log into their local Windows accounts when their computer is not connected to the Internet. Normally, a network connection is required for the Protectimus two-factor authentication solution to work on Windows, as the Protectimus Winlogon component communicates with the authentication server to confirm one-time passwords. Before we released backup codes, if users found themselves in a situation where it was impossible to connect to the Internet, they could not log in to their accounts and continue working. Now, when installing the component, you can generate and save a backup code and then use it instead of a one-time password to log into your account in offline mode.


2020-09-15

Two-factor authentication directly in AD / LDAP / databases

Protectimus DSPA (Dynamic Strong Password Authentication) is the world's first 2FA solution that allows you to implement two-factor authentication directly in Active Directory, LDAP, database or any other user directory. Protectimus DSPA adds a TOTP one-time password (123456) to the static password (password) and changes the temporary part of such a complex password (password123456) according to the time interval set by the administrator. All standard MFA solutions protect only endpoints (e.g., OWA, ADFS), if an attacker accesses the user's storage directly (bypassing the endpoint), they will be able to access the account knowing only a static password. Protectimus DSPA eliminates such risks. Read more about Protectimus DSPA here.


2019-12-04

News archive

Knowledge base

Perhaps, your usual single password authentication is not enough? Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password. With computers replacing half of the humans’ occupations in 20 years, we have to be ready for new threats. Complex for violators multifactor authentication is the least you can do to protect your business life.

There are different ways to secure data, starting from old-fashioned methods and ending with multi factor authentication software implementation. A person can use a simple paper notebook to collect all vital data. Or, you can create new passwords every day. Thus, you maintain an authentication, but risk to forget or mix-up service login authorization information. Mobile apps are also often used to protect data by keeping all necessary info for services, where strong authentication is required. But if the application password is broken, all crucial data gets easily leaked.

If you want to add advanced and robust user’s authorization features to your site, you can use a two factor user authentication service. This is a great and the only way to add two factor security to your site without investing in hardware, a team of administrators, load balancing, and other infrastructure-related things. Your users can benefit from the increased security of two step sign in process, and you don’t have to go through a dramatic increase in costs. The SaaS-based solution is ready to get up and running.

Today, user authentication software is implemented everywhere. This is why we can say the following statement about two step verification: you can enable two factor authentication in every project of a great importance, web-site, database, transaction signing, any system that uses login and password. Best 2 factor authentication feature is that you get a more secure software authentication, using simple instruments and affordable solutions. Protectimus makes two factor authentication system work for your security needs and profit.

If you want to enable two factor authorization for your growing site, all you need to do is select the auth service that’s best for you. Whether you prefer cheap two factor authentication solutions or require advanced multi factor security features, Protectimus is always able to protect your important data. Our two factor authentication products let you pay as you use the service and deactivate the dual authentication plan at any time, as you implement changes to your site.

Running a business is always a risk. You can count different risks, however one rarely thinks of a probability for the important data to be lost. But if you do, how much would the data security trouble cost? You can think about 2 step verification for your project users as a way to protect your data and avoid certain risks. At Protectimus, you can get a truly affordable two step security service. The prices are evidently reasonable and cheaper than among other services. See our ‘Prices’ page to compare prices for authentication software services worldwide and choose what is best for you.

Today, we should not underestimate corporate culture. Although there are many people thinking corporate culture is a myth, being a part of something bigger than just a job makes a workers’ loyalty. Even remote workers can appreciate a corporate expression of a high regard. You can fulfill two tasks with Protectimus: give your employees a sign of courtesy and ensure they get a 2 step verification password with a branded hardware token. It takes more time for such tokens to be delivered, however the result can be worth trying. Contact our support for more details.

When you find out what is 2 factor authentication and why 2 factor authentication is essential for your personal or/and business needs, it is high time to choose the best security software provider. At Protectimus, we offer the most applicable solutions. Our tokens are diverse and are programmed to let you and your collaborators get 2 step verification code in the most effective way. Our customers enjoy prominent security solutions, user-friendly interface, additional features, tools and service’s loyalty. We know that security matters. Getting your data double-protection is the best benefit.

Modern methods, such as 2 factor authentication products, allow doing less, but getting an upscale security level. Two step verification is probably the best way to keep your data safe. Wrapping all time-tested methods in an up-to-date form is what a 2 factor authentication token is. With Protectimus, you get unlimited one-time passwords for the best data protection.

Two factor authentication, also sometimes referred to as multi factor authentication or two step authentication, is a strong user authentication method required a combination of “something you know” and “something you have”. Usually the process involves a password, and a 2 step verification code obtained from a physical or a software token. A simple example of 2 way authentication is a credit card. Plastic card itself is a something you have, while the PIN code is a ‘password’ that you know. We cannot say this security mechanism is the best multi factor authentication approach, though.

Protectimus programmers and engineering team has developed various token models for getting a 2 step authentication service. There are several free options, adjustable to small business or companies with remote workers, such as Protectimus SMART and Protectimus MAIL. If you are seeking for convenient, simple, familiar to users solution, then Protectimus SMS can be your inalienable second factor authentication tool. Three Protectimus top-notch hardware token models – ONE, ULTRA, SLIM – give your company access to most functional and reliable 2 factor security solutions.

Crucial Data Protection?

How To Protect Data?

 

How 2FA Protects My Data?

2FA Applicability?

 

2FA Implementation?

Affordable 2FA Service?

 

Brand Your 2FA Product?

Protectimus Benefits?

 

Best Security Enforcement?

What Is 2FA Service?

 

Which Token To Choose?

  • How it works
  • Solutions
  • Tokens
  • Pricing
  • Features
  • Docs
OATH certified
OATH certified
ALL RIGHTS RESERVED. PROTECTIMUS SOLUTIONS LLP. 2020