Keycloak Multi-Factor Authentication With Hardware Tokens
Mar25

Keycloak Multi-Factor Authentication With Hardware Tokens

Nowadays, when hackers constantly look for vulnerabilities, while more and more aspects of life are being digitized, cyber security is of utmost importance and every app developer has to pay special attention to access management. Keycloak is one of the most ingenious solutions created with app developers in mind. It provides an elegant and easy way for securing modern applications and services. With Keycloak comes an easy to roll out...

Read More
Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens
Sep19

Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens

Almost all universities and colleges in the US, Canada, and EU use two-factor authentication to protect their faculty and staff accounts. Quite often they choose in-app 2-factor authentication, which means that one-time passwords are generated on the users’ smartphones. Though, in this case, they face a few issues: Not everybody agrees to use their personal smartphones for corporate needs. Some people still use old models...

Read More
10 Most Popular Two-Factor Authentication Apps Compared
Feb21

10 Most Popular Two-Factor Authentication Apps Compared

This article discusses two-factor authentication apps, which feature different functionalities, are based on different principles but serve one purpose – reliable protection of access to sensitive information. Today, we will try to review some of the most popular applications for one-time passwords generation from the Google Play market and two hardware OTP tokens that can replace two-factor authentication apps. There are a lot...

Read More
The Pros and Cons of Different Two-Factor Authentication Types and Methods
Jan10

The Pros and Cons of Different Two-Factor Authentication Types and Methods

Along with the first digital devices rose a need to ensure the security of stored data and to differentiate access to various functions. A variety of methods for unambiguous authentication of users on which security is based are called authentication factors. These include codes, logins, passwords, certificates, hardware keys, and so on. The whole set of authentication factors can be divided into three groups: Factors of knowledge...

Read More
Protectimus Cuts the Prices
May26

Protectimus Cuts the Prices

Two-factor authentication is an indispensable element of modern information security system. Today, every resource, which stores confidential user data, is obliged to provide reliable data protection. It is dangerous and unprofitable to “recreate the wheel”. Developing a 2-step verification system on its own, the company assumes full responsibility for data protection. Very often such solutions have vulnerabilities that would later...

Read More