Protectimus vs. Okta MFA: A Comprehensive Comparison
Mar09

Protectimus vs. Okta MFA: A Comprehensive Comparison

When seeking a multi-factor authentication solution, it can be quite challenging to figure out which one best suits your needs. With this in mind, we decided to start a series of articles comparing the Protectimus multi-factor authentication system with MFA services provided by other leading companies in the field. In this article, we will compare Protectimus MFA with Okta MFA. Both companies offer robust and comprehensive two-factor...

Read More
Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm
Jul13

Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm

Introducing Protectimus SHARK, a cutting-edge hardware TOTP token that supports the SHA-256 hashing algorithm. With Protectimus SHARK, you get a reliable authentication device that generates one-time passwords with unmatched security. Unlike older OTP tokens that used SHA-1, Protectimus SHARK takes a step ahead with the more up-to-date and secure SHA-256 hashing algorithm. This advanced token authentication solution creates an...

Read More
The Advantages of SHA-256 over SHA-1 for TOTP Token Security
Jul04

The Advantages of SHA-256 over SHA-1 for TOTP Token Security

In the realm of TOTP token security, the choice of hash algorithm plays a crucial role. Two popular contenders, SHA-256 and SHA-1, stand apart in terms of their advantages and impact on overall security. In this article, we will delve into the advantages offered by SHA-256 over SHA-1, shedding light on its robustness, compatibility, and resistance to vulnerabilities. By understanding the nuances of these hashing algorithms, you can...

Read More
How to Backup Google Authenticator or Transfer It to a New Phone
Jun30

How to Backup Google Authenticator or Transfer It to a New Phone

Our regular readers know that we strongly recommend applying two-step verification wherever it’s possible. In the contemporary world, where database leaks are a standing affair, two-step authentication is not an option, it is, in fact, a must. If you use two-factor verification, an intruder would need to get both the unique password you came up with, and the gadget, which produces the verification codes, to break into your account....

Read More
New Programmable TOTP token Protectimus Flex
Dec09

New Programmable TOTP token Protectimus Flex

Listen to this article You asked, and we delivered – the new programmable TOTP token Protectimus Flex in a key fob format is already here! Unlike our other popular programmable hardware token Protectimus Slim NFC, the new Protectimus Flex TOTP token comes in the form of a key fob. This makes our latest two-factor authentication hardware token more comfortable to use, and more durable. The security token can easily be fastened to...

Read More