Two-Factor Authentication

Something you know and something you have.

Two-factor authentication reinforces access security by requiring two methods (also referred to as factors) to verify your identity…

Just like you would with your internet banking.

Cost Efficient Security Solution

Easy to Use

Increase Security and Compliance

Two-Factor Authentication

Something you know and something you have.
Two-factor authentication reinforces access security by requiring two methods (also referred to as factors) to verify your identity.

Cost Efficient Security Solution

Easy To Use

Reduce Security and Compliance Risks

These factors can include…

1. Something You Know

Like a Username and Password

2. And Something You Have

Like a Smartphone App

This information is then used to approve authentication requests.

Two-Factor Authentication secures your logins from attackers exploiting weak or stolen credential.

 

IT ALSO PROTECTS AGAINST:

Phishing
Phishing will often look legitimate and entice you to open an attachment or click on a link. But once you do this, it will infect your device with malware, encrypt your files and hold them at ransom or take you to a malicious website that will encourage you to enter log in details and personal information.
Social Engineering
Social engineering is the art of manipulating people so they give up confidential information. Criminals try to access passwords, bank information or your computer to secretly install malicious software – resulting in them gaining control over your computer.
Password Brute-Force Attacks
This is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). Automated software is used to generate a large number of consecutive guesses as to the value of the desired data.

Two-Factor Authentication secures your logins from attackers exploiting weak or stolen credential.

 

IT ALSO PROTECTS AGAINST:

 

 

Phishing
Phishing will often look legitimate and entice you to open an attachment or click on a link. But once you do this, it will infect your device with malware, encrypt your files and hold them at ransom or take you to a malicious website that will encourage you to enter log in details and personal information.
Social Engineering
Social engineering is the art of manipulating people so they give up confidential information. Criminals try to access passwords, bank information or your computer to secretly install malicious software – resulting in them gaining control over your computer.
Password Brute-Force Attacks
This is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). Automated software is used to generate a large number of consecutive guesses as to the value of the desired data.

Secure

Secure access to company applications and data

Protection

Extra layer of protection against phishing and access threats

Compliance

Assists with GDPR compliance

How does it work?

 

Are You Really Who You Say You Are?

When you login to your desktop, laptop or cloud based service such as Office 365, Dropbox, Google etc you will be asked for your username and password.

Verify Your Information

Once entered you will then be prompted to verify that it is you using your details.

Remain Secure.

Verification can be done in a number of ways from pushing a OTP (One Time Pin) to an app on your mobile device, a secure code generated by a RSA key fob, or USB security key.

Secure

Secure access to company applications and data

Protection

Extra layer of protection against phishing and access threats

Compliance

Assists with GDPR compliance

How does it work?

 

Are You Really Who You Say You Are?

When you login to your desktop, laptop or cloud based service such as Office 365 you will be asked for your username and password.

Verify Your Information

Once entered you will then be prompted to verify that it is you using your details.

Remain Secure.

Verification can be done in a number of ways from pushing a OTP (One Time Pin) to an app on your mobile device, a secure code generated by a RSA key fob, or USB security key.

How can it be implemented in your organisation?

Some examples of how Two-Factor Authentication can be used…

RDP (Remote Desktop / Terminal Server)

Anyone who utilises RDP for remote access can easily activate 2FA with this simple integration. 

Protect Windows Logins On End Users Devices

Secure access to company applications and data.

VPNs

 

Whether it’s a native integration or a generic RADIUS integration, enabling user validation via 2FA is extremely simple with PCS 2FA.

O365

  

As you move to O365, you expose yourself to risk of stolen passwords. Implementing 2FA ensures secure access to your cloud based services.

 

Question Time!

Want to find out more about Two-Factor Authentication?

Get in touch by filling out the form below.

2-4 Northfield Point, Cunliffe Drive, Kettering, Northants
NN16 9QJ

08452 41 41 55

ask@pcs-systems.com