Protectimus vs. Okta MFA: A Comprehensive Comparison
Mar09

Protectimus vs. Okta MFA: A Comprehensive Comparison

When seeking a multi-factor authentication solution, it can be quite challenging to figure out which one best suits your needs. With this in mind, we decided to start a series of articles comparing the Protectimus multi-factor authentication system with MFA services provided by other leading companies in the field. In this article, we will compare Protectimus MFA with Okta MFA. Both companies offer robust and comprehensive two-factor...

Read More
Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm
Jul13

Protectimus SHARK: A TOTP Token Empowered by SHA-256 Algorithm

Introducing Protectimus SHARK, a cutting-edge hardware TOTP token that supports the SHA-256 hashing algorithm. With Protectimus SHARK, you get a reliable authentication device that generates one-time passwords with unmatched security. Unlike older OTP tokens that used SHA-1, Protectimus SHARK takes a step ahead with the more up-to-date and secure SHA-256 hashing algorithm. This advanced token authentication solution creates an...

Read More
The Advantages of SHA-256 over SHA-1 for TOTP Token Security
Jul04

The Advantages of SHA-256 over SHA-1 for TOTP Token Security

In the realm of TOTP token security, the choice of hash algorithm plays a crucial role. Two popular contenders, SHA-256 and SHA-1, stand apart in terms of their advantages and impact on overall security. In this article, we will delve into the advantages offered by SHA-256 over SHA-1, shedding light on its robustness, compatibility, and resistance to vulnerabilities. By understanding the nuances of these hashing algorithms, you can...

Read More
TOTP Tokens for Electronic Visit Verification (EVV): How They Work
Feb09

TOTP Tokens for Electronic Visit Verification (EVV): How They Work

Protectimus offers an Electronic Visit Verification (EVV) system that uses Time-Based One-Time Password (TOTP) generation algorithm for calculating the exact time of visits. The solution uses hardware TOTP tokens as EVV devices, providing a cost-effective and privacy-friendly alternative to traditional EVV methods like GPS tracking or video cameras. Learn more about Protectimus EVV In this article we’ll examine: what is Electronic...

Read More
Office 365 MFA Hardware Token
Nov10

Office 365 MFA Hardware Token

In this article we show how to add a Microsoft Office 365 MFA hardware token Protectimus Slim and Protectimus Flex to your Office 365. You don’t need a premium license to connect these hardware OATH tokens to Office 365 accounts. With over 31 million users worldwide Microsoft Office 365 is unsurprisingly a bestseller among the productivity software subscription suits on the market. Its compatibility with the major operating...

Read More