The Evolution of Two-Step Authentication
With the advent of computer technologies in everyday life, the protection of data transmitted and stored in the network has become a necessity. Along with the hardware and software components, the data protection systems must include authentication tools that can prevent unauthorized access to the accounts. At first, the usual reusable passwords seemed a quite sufficient protection means. But, it soon became clear that this way of...
Protectimus New OTP Tokens
The range of Protectimus OTP tokens is expanded with new hardware tokens for one-time passwords generation. Meet – Protectimus TWO and Protectimus SLIM mini. Protectimus TWO is a handy hardware token made in the form of a key fob. It works according to the TOTP algorithm. It is waterproof, and its battery life is up to 5 years. The main distinguishing feature of this token – is the possibility to select the time interval...
Hardware or Software Token – Which One to Choose?
Striving for maximum versatility and convenience is the main trend of our time. It triggers a general affection (which often borders on addiction) for smartphones. For a modern person, these small devices embody the principle “All that is mine, I carry with me”. A regular phone has now become a mini laptop computer, which also enables you to make calls (but it is no longer its leading feature). Since any computer should...
Protectimus team at Startup Crash Test #2
September 4 in Kharkiv was held a non-profit event Startup Crash Test #2. The main purpose of the event was to test the strength of the startups, which took part in it. Startups’ teams had a chance to talk about their ideas and marketing strategies. They heard a lot of constructive criticism from IT professionals. And they learned several useful tips that can help them to achieve success in the future. The Protectimus Company became...