We announce Protectimus EVV - an Electronic Visit Verification solution built on the basis of a Time-Based One-Time Password Algorithm (TOTP). Electronic Visit Verification helps to avoid cheating from the staff providing home healthcare and personal care services. The EVV systems monitor the precise time when every visit takes place and how long does it last. This way, it becomes clear if the healthcare or homecare employee really visited their clients and provided the declared services. EVV will become mandatory in all the US states by 2023. Protectimus EVV system allows using hardware TOTP tokens to verify the time and duration of visits as the Time-Based One-Time Password Algorithm makes it possible to determine the exact time when each one-time password was generated. Learn more about the Protectimus Electronic Visit Verification system here.
We are launching the sale of a new model of programmable hardware TOTP tokens - Protectimus Flex. Protectimus Flex security tokens are made in the form of keyfobs, and this is their main difference from the popular Protectimus Slim NFC. A key fob is a perfect design for an OTP token. Users attach keyfob tokens to their keychains, which makes it less likely that they lose or forget the device at home or work. To flesh the seed into the TOTP token Protectimus Flex, you need an Android phone supporting NFC. Note that one token can store one seed up to 32 characters long in Base 32. Programmable OTP tokens can be connected not only to the Protectimus multi-factor authentication service but almost to any website that supports MFA applications.
A new version of the Protectimus Winlogon component with backup codes function is already released and available on the site. Backup codes allow users to log into their local Windows accounts when their computer is not connected to the Internet. Normally, a network connection is required for the Protectimus two-factor authentication solution to work on Windows, as the Protectimus Winlogon component communicates with the authentication server to confirm one-time passwords. Before we released backup codes, if users found themselves in a situation where it was impossible to connect to the Internet, they could not log in to their accounts and continue working. Now, when installing the component, you can generate and save a backup code and then use it instead of a one-time password to log into your account in offline mode.
Perhaps, your usual single password authentication is not enough? Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password. With computers replacing half of the humans’ occupations in 20 years, we have to be ready for new threats. Complex for violators multifactor authentication is the least you can do to protect your business life.
There are different ways to secure data, starting from old-fashioned methods and ending with multi factor authentication software implementation. A person can use a simple paper notebook to collect all vital data. Or, you can create new passwords every day. Thus, you maintain an authentication, but risk to forget or mix-up service login authorization information. Mobile apps are also often used to protect data by keeping all necessary info for services, where strong authentication is required. But if the application password is broken, all crucial data gets easily leaked.
If you want to add advanced and robust user’s authorization features to your site, you can use a two factor user authentication service. This is a great and the only way to add two factor security to your site without investing in hardware, a team of administrators, load balancing, and other infrastructure-related things. Your users can benefit from the increased security of two step sign in process, and you don’t have to go through a dramatic increase in costs. The SaaS-based solution is ready to get up and running.
Today, user authentication software is implemented everywhere. This is why we can say the following statement about two step verification: you can enable two factor authentication in every project of a great importance, web-site, database, transaction signing, any system that uses login and password. Best 2 factor authentication feature is that you get a more secure software authentication, using simple instruments and affordable solutions. Protectimus makes two factor authentication system work for your security needs and profit.
If you want to enable two factor authorization for your growing site, all you need to do is select the auth service that’s best for you. Whether you prefer cheap two factor authentication solutions or require advanced multi factor security features, Protectimus is always able to protect your important data. Our two factor authentication products let you pay as you use the service and deactivate the dual authentication plan at any time, as you implement changes to your site.
Running a business is always a risk. You can count different risks, however one rarely thinks of a probability for the important data to be lost. But if you do, how much would the data security trouble cost? You can think about 2 step verification for your project users as a way to protect your data and avoid certain risks. At Protectimus, you can get a truly affordable two step security service. The prices are evidently reasonable and cheaper than among other services. See our ‘Prices’ page to compare prices for authentication software services worldwide and choose what is best for you.
Today, we should not underestimate corporate culture. Although there are many people thinking corporate culture is a myth, being a part of something bigger than just a job makes a workers’ loyalty. Even remote workers can appreciate a corporate expression of a high regard. You can fulfill two tasks with Protectimus: give your employees a sign of courtesy and ensure they get a 2 step verification password with a branded hardware token. It takes more time for such tokens to be delivered, however the result can be worth trying. Contact our support for more details.
When you find out what is 2 factor authentication and why 2 factor authentication is essential for your personal or/and business needs, it is high time to choose the best security software provider. At Protectimus, we offer the most applicable solutions. Our tokens are diverse and are programmed to let you and your collaborators get 2 step verification code in the most effective way. Our customers enjoy prominent security solutions, user-friendly interface, additional features, tools and service’s loyalty. We know that security matters. Getting your data double-protection is the best benefit.
Modern methods, such as 2 factor authentication products, allow doing less, but getting an upscale security level. Two step verification is probably the best way to keep your data safe. Wrapping all time-tested methods in an up-to-date form is what a 2 factor authentication token is. With Protectimus, you get unlimited one-time passwords for the best data protection.
Two factor authentication, also sometimes referred to as multi factor authentication or two step authentication, is a strong user authentication method required a combination of “something you know” and “something you have”. Usually the process involves a password, and a 2 step verification code obtained from a physical or a software token. A simple example of 2 way authentication is a credit card. Plastic card itself is a something you have, while the PIN code is a ‘password’ that you know. We cannot say this security mechanism is the best multi factor authentication approach, though.
Protectimus programmers and engineering team has developed various token models for getting a 2 step authentication service. There are several free options, adjustable to small business or companies with remote workers, such as Protectimus SMART and Protectimus MAIL. If you are seeking for convenient, simple, familiar to users solution, then Protectimus SMS can be your inalienable second factor authentication tool. Three Protectimus top-notch hardware token models – ONE, ULTRA, SLIM – give your company access to most functional and reliable 2 factor security solutions.