Ukraine flag

We stand with our friends and colleagues in Ukraine. To support Ukraine in their time of need visit this page

Our demo. Spend 5 minutes usefully

Step 1. The Problem

A large number of electronic systems, portals, sites, blogs, social networks — and even some financial and payment systems have weak data protection systems in place. Most of them use simple passwords.

Is this reliable?

Not at all—and this is proven by the constant reports of breaches and theft of users’ personal data.

What do information security specialists recommend?

  • Use passwords no shorter than 10 characters. Sixteen-character passwords are considered uncrackable at the moment 🙂
  • Periodically (at least every three months) change them. Each time, use a new password.
  • Do not save or write down passwords.
  • Use a separate password for each system.
  • Passwords shouldn’t be based on words (or dates, telephone numbers, an ICQ login, etc.) and should contain different kinds of characters.

Here are examples of complex passwords:

		rgLRjx$YkTj   P3T!3$5LQP6   T3cdzR4A16g
		uJYkFgF$i94   2J6ynf6dzbg   aO$D3wyBi~h
		0q5VTNO4xc3   }W7CS1lKpko   I@RGHMG4%wt

Do these guarantee a high degree of security?

No. Passwords can be intercepted, read from the keyboard, seen by others, or brute forced. But all of these things really guarantee an inconvenience to the user.

Step 2. The Solution

For 100% protection, it’s best to not use any resources, or to deploy all necessary services on a local network, without access to a global or outside network.

What can you do, then, if these options don’t work for you?

We have the answer to your questions. Implementing a reliable multi-factor authentication solution as a core element of your security policy significantly increases the security of the whole system.

What is it?

Multi-factor authentication is a means of user authentication based on what the user knows, what he owns, and who he is. In practice, this means that users must, in addition to the usual username and password, input a one-time password from a token or from their phones. These one-time passwords are valid for one authentication only and have a short time-to-live.

2nd authentication factor

Step 3. Our Tokens

Protectimus doesn’t limit you in your choice of one-time password delivery methods, offering a full range of tokens. Get to know them:

our 2fa tokens

Step 4. Installation and Issuing Tokens

Let’s take a look at how two-factor authentication works using the Protectimus SMART software token.

1. Installing the token on a smartphone

Install the app on your smartphone by scanning the QR code (requires internet connection).


2. Issuing a token

Issue a new token using Protectimus SMART by scanning the QR code.

Выпустите демо токен, используя Protectimus Smart

In the demo mode, you don’t need to confirm the correct creation of the token using a one-time password.

Token parameters:

  • Algorithm: TOTP (time-based)
  • One-time password length: 6

Step 5. The Authentication Process

1. The first factor. Username and password

In our case any username and password will be correct.

2. Second factor. One-time password

Enter one-time password from the token which was issued on previous step.

Verify one-time password

Step 6. Data Signing with a Token

This example clearly demonstrates the simplicity of transactions data signing or other operations. Transactions data signing protects against the majority of common threats today: phishing, viruses, social engineering, man-in-the-middle attacks, and many others

Transaction data

You can enter any data or leave them unchanged.

Transfer amount:
Generate transaction

Verify transaction data

Select “Data signing” in the Protectimus SMART app and scan the QR code.

Enter the value from your token:
Validate transaction