Sophos 2FA with Hardware OTP Tokens
Dec02

Sophos 2FA with Hardware OTP Tokens

Sophos solutions allow for reinforcing Sophos 2FA (two-factor authentication) with Protectimus OTP hardware tokens with one of these two methods: Enabling ‘Auto-create OTP tokens for users’ feature. This automatic method allows for using our programmable Slim NFC token instead of the standard application for multi-factor authentication.Disabling ‘Auto-create OTP tokens for users’ feature. This manual method allows for...

Read More
2FA Chatbots vs. SMS Authentication
Oct22

2FA Chatbots vs. SMS Authentication

In this article, we’ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We’ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication. Table of contents: How did the Protectimus Bot token come to be? How does two-factor authentication with chatbots work? 2FA...

Read More
Two-factor authentication for Windows 7, 8, 10, 11
May07

Two-factor authentication for Windows 7, 8, 10, 11

Since Windows is one of the most used systems, especially among various businesses, it makes sense to thoroughly protect it. Protectimus has an excellent two-factor authentication software for Windows 7, 8, 8.1, 10, 11. In this article, we will look into how it works and how to set it up. And we will address the most common questions on our two-factor authentication for Windows login. How does two-factor authentication for Windows...

Read More
Electronic Visit Verification  with Hardware Tokens
Apr17

Electronic Visit Verification with Hardware Tokens

Protectimus multifactor authentication solution is an ingenious, versatile system that can be used in many ways, from helping developers implement two-factor authentication on their apps and services to protecting an end user’s Office 365 account with the help of hardware tokens. Our team made Protectimus system truly versatile, it could be customized to create even the most unconventional solutions to fit our clients’ needs. In...

Read More
Keycloak Multi-Factor Authentication With Hardware Tokens
Mar25

Keycloak Multi-Factor Authentication With Hardware Tokens

Nowadays, when hackers constantly look for vulnerabilities, while more and more aspects of life are being digitized, cyber security is of utmost importance and every app developer has to pay special attention to access management. Keycloak is one of the most ingenious solutions created with app developers in mind. It provides an elegant and easy way for securing modern applications and services. With Keycloak comes an easy to roll out...

Read More