Duo Security vs Protectimus: Features
Nov16

Duo Security vs Protectimus: Features

In Duo Security vs Protectimus, we touched on all the aspects of Duo and Protectimus two-factor authentication solutions. We examined the technologies these companies use, their methods of delivering one-time passwords, the availability of an API and pre-made plugins for integration, pricing, availability in cloud-based and on-premise forms, and — briefly — the features of each solution. In this article, we describe in greater detail...

Read More
Duo Security vs Protectimus: Authentication Methods
Nov16

Duo Security vs Protectimus: Authentication Methods

You can find a general comparison of the Duo Security and Protectimus two-factor authentication solutions in the article “Duo Security vs Protectimus“. In it, we explore the features and technologies used by Duo and Protectimus, the availability of these solutions in cloud-based and on-premise forms, integration options and prices, and the authentication methods offered by each company. Here, we describe the authentication...

Read More
Strong Customer Authentication According To PSD2: Summary & Checklist
Mar07

Strong Customer Authentication According To PSD2: Summary & Checklist

The changes that are guaranteed to transform the EU financial market have finally arrived. On January 13, 2018, the second Payment Services Directive (commonly known as PSD2) came into force in the European Union. In this article, we’ve gathered all the information on PSD2 security and strong customer authentication requirements to help the existing and future companies to get ready for these changes. So let’s get started with our...

Read More
10 Most Popular Two-Factor Authentication Apps Compared
Feb21

10 Most Popular Two-Factor Authentication Apps Compared

This article discusses two-factor authentication apps, which feature different functionalities, are based on different principles but serve one purpose – reliable protection of access to sensitive information. Today, we will try to review some of the most popular applications for one-time passwords generation from the Google Play market and two hardware OTP tokens that can replace two-factor authentication apps. There are a lot...

Read More
The Pros and Cons of Different Two-Factor Authentication Types and Methods
Jan10

The Pros and Cons of Different Two-Factor Authentication Types and Methods

Along with the first digital devices rose a need to ensure the security of stored data and to differentiate access to various functions. A variety of methods for unambiguous authentication of users on which security is based are called authentication factors. These include codes, logins, passwords, certificates, hardware keys, and so on. The whole set of authentication factors can be divided into three groups: Factors of knowledge...

Read More