Strengthening Security with Multi-Factor Authentication for RADIUS
Jul16

Strengthening Security with Multi-Factor Authentication for RADIUS

As technology evolves, so do the methods of cyberattacks, making traditional authentication vulnerable. This is where Multi-Factor Authentication (MFA) steps in, offering an extra layer of defense. In this article, we delve into the synergy between MFA and RADIUS-enabled devices and software, exploring how this dynamic duo bolsters protection against modern security challenges and how to integrate multi-factor authentication for...

Read More
On-Premise 2FA vs Cloud-Based Authentication
May01

On-Premise 2FA vs Cloud-Based Authentication

The basic idea behind any type of multi-factor authentication is communication between an MFA device and a server. An MFA server can be set up either on-premise (locally within your company’s infrastructure) or in a cloud. Both approaches have their pros and cons. In this post, we aim to give you a comprehensive comparison of cloud multi-factor authentication vs on-premise 2FA solutions to help you choose the best 2-factor...

Read More
Protectimus Customer Stories: 2FA for Volet
Apr30

Protectimus Customer Stories: 2FA for Volet

Volet is a popular payment system for convenient international payments and transactions with cryptocurrencies. Millions of people around the world use the Volet payment system services daily Volet has been cooperating with Protectimus since 2015, and we are extremely pleased with the results of this cooperation. Over the past years, we’ve had only positive cases of working together. Protectimus helped us at every stage, from...

Read More
Behind the Scenes at Protectimus: Where Cybersecurity Meets Fun and Innovation
Oct17

Behind the Scenes at Protectimus: Where Cybersecurity Meets Fun and Innovation

In the fast-changing world of cybersecurity, where every piece of code and every bit of data needs rock-solid protection, our company stands out not only for its cutting-edge multi-factor authentication solutions but also for its exceptional corporate ethos. In this article, we want to show you what’s special about Protectimus team. It’s a place where cybersecurity experts don’t just protect data; they also enjoy a...

Read More
Active Directory Two-Factor Authentication
Aug02

Active Directory Two-Factor Authentication

It is hard to manage multiple users and systems, especially when there are not even hundreds, but thousands of them in a network. That’s why businesses and organizations love Microsoft Active Directory. It allows for storing and managing all the information on the organization’s systems, users, their credentials, sites and whatever else you might think of in a network, in one place. But you must agree that this much of fundamentally...

Read More
Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm
Jul13

Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm

Introducing Protectimus SHARK, a cutting-edge hardware TOTP token that supports the SHA-256 hashing algorithm. With Protectimus SHARK, you get a reliable authentication device that generates one-time passwords with unmatched security. Unlike older OTP tokens that used SHA-1, Protectimus SHARK takes a step ahead with the more up-to-date and secure SHA-256 hashing algorithm. This advanced token authentication solution creates an...

Read More