Hardware Tokens for Azure MFA
Aug02

Hardware Tokens for Azure MFA

There are currently two ways to implement an Azure hardware token for Azure Multi-Factor Authentication: With classic OATH tokens for Azure MFA with hard-coded secret keys, such as Protectimus Two. To make use of one of these you’ll need Azure AD Premium P1 or P2 license. With a programmable hardware token for Azure MFA Protectimus Slim NFC or Protectimus Flex which is a replacement for an authentication app from Microsoft. This Azure...

Read More
Top 5 Two-Factor Authentication Products by Protectimus
Jan17

Top 5 Two-Factor Authentication Products by Protectimus

Protectimus is one of the biggest and most reliable two-factor authentication providers. We’ve been developing cutting-edge 2FA solutions since 2014. Being a coordination member of the OATH Initiative for Open Authentication, Protectimus is one of the strongest voices in the propagation of ubiquitous strong authentication. The main problem Protectimus works on is perfecting multi-factor auth solutions, to make 2FA easier, cheaper, and...

Read More
Adaptive Authentication or How to Make 2FA Convenient for Users
Aug27

Adaptive Authentication or How to Make 2FA Convenient for Users

Any of us is interested in protecting confidential data from becoming the public domain on the web. Especially from people who are looking for such information for fraudulent purposes. The effective methods to avoid the invasion of online privacy are already known. And one of the most accessible ways is protecting access to your accounts with two-factor authentication. But… unfortunately, people don’t always use this...

Read More
How to Enable Protectimus Self-Service Portal
Jul02

How to Enable Protectimus Self-Service Portal

The Protectimus two-factor authentication service and on-premise platform offer a self-service feature that allows users to independently perform a number of actions related to issuing and managing their OTP tokens and their own data. The system administrator determines which actions are available to users. The list of possible actions includes: registration of new tokens;registration of existing tokens;re-assigning the...

Read More
Securing VPN with Two-Factor Authentication
Feb23

Securing VPN with Two-Factor Authentication

VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company’s private server. And while this secures the corporate infrastructure from the direct attacks of malicious agents,...

Read More
New Programmable TOTP token Protectimus Flex
Dec09

New Programmable TOTP token Protectimus Flex

Listen to this article You asked, and we delivered – the new programmable TOTP token Protectimus Flex in a key fob format is already here! Unlike our other popular programmable hardware token Protectimus Slim NFC, the new Protectimus Flex TOTP token comes in the form of a key fob. This makes our latest two-factor authentication hardware token more comfortable to use, and more durable. The security token can easily be fastened to...

Read More