Virtual Graffiti Ltd - Your Source for Technology Solutions

  Virtual Graffiti

The Vulnerability of Passwords

As computers and mobile devices play an ever-expanding role in our lives, our digital accounts have become valuable targets for criminals. Not surprisingly, cyberattacks against companies, organizations and individuals have skyrocketed in recent years with no signs of slowing down. Fortunately, there is an easy way for companies and businesses to add an extra coating of protection to their users’ accounts. The solution: Two Factor Authentication (2FA). Companies specializing in cyber security have developed sophisticated (2FA) methods to protect users’ information: We have chosen a list of two factor authentication products for you that our customers like the most:

Watchguard Authpoint

WatchGuard AuthPoint™ is the right solution at the right time to address this security gap with multi-factor authentication on an easy-to-use Cloud platform. With a simple push notification, the AuthPoint mobile app makes each login attempt visible, allowing the user to accept or block access right from their smartphone. WatchGuard’s unique approach adds the “mobile phone DNA” as an identifying factor to further ensure that only the correct individual is granted access to sensitive networks and Cloud applications. WatchGuard’s AuthPoint solution is a Cloud service, so there’s no expensive hardware to deploy, and it can be managed from anywhere using WatchGuard Cloud’s intuitive interface. Additionally, our ecosystem offers dozens of integrations with 3rd party applications – ensuring that MFA protection is broadly applied for access to sensitive Cloud applications, web services, VPNs and networks. AuthPoint users can sign in once to access multiple applications, and they appreciate being able to add 3rd party authenticators, such as for Facebook or Google Authenticator, to the friendly mobile app.

FortiToken

One Time Password Token for Strong Authentication FortiToken Strong Authentication Solutions allow you to easily enable Two-factor Authentication for access to protected Networks and Security devices. Two-factor authentication solutions improve security and reduce the risk of compromise inherent in single-factor authentication solutions such as static passwords. FortiToken 2-factor authentication solution devices enable administrators to offer enhanced security for both remote and on-premise users. It ensures that only authorized individuals can access your organization's sensitive information. Each FortiGate™ consolidated security platform is able to provide an integrated authentication server. Combining this strong authentication capability with one of the FortiToken One Time Password (OTP) security devices or mobile applications eliminates the need for an external authentication server. The short-lived, time-based token adds strong authentication to secure remote IPSEC and SSL VPN access, Wi-Fi Captive Portal network logon and FortiGate Administrator login. The token always remains synchronized with the FortiGate controller.

FortiAuthenticator

FortiAuthenticator allows you to extend the support for FortiTokens across your enterprise by enabling authentication with multiple FortiGate appliances and third-party devices. Standards-based secure authentication which works in conjunction with FortiTokens to deliver secure two-factor authentication to any third-party device capable of authentication via RADIUS or LDAP
  • Hardened appliance that can be deployed in minutes to secure access to your network infrastructure
  • Integrates with existing solutions such as LDAP or AD servers to lower the cost and complexity of adding strong authentication to your network
  • User self-service password reset lowers your costs by allowing your users to reset their own password without administrator intervention
  • Certificate Authority functionality simplifies your CA management and delivers user certificate signing, FortiGate VPN, or server x.509 certificates for use in certificate-based two-factor authentication
  • Upgrade path from FortiGate/FortiToken allows you to maximize your existing investment and scale your two-factor deployment when needed

RSA Token Guard

Deliver convenient, secure access to your extended enterprise with RSA SecurID Access, the leading multi-factor authentication and identity assurance solution. Whether you deploy it "as a service" in the cloud or on premises, RSA SecurID Access protects both SaaS applications and traditional enterprise resources with a full range of authentication methods and dynamic, risk-driven access policies. RSA SecurID Access enables organizations to empower employees, partners, contractors and customers to do more without compromising security or convenience. RSA SecurID Access ensures that users have timely access to the applications they need—from any device, anywhere—and ensures that users are who they say they are. RSA SecurID Access provides these benefits with the following capabilities:
  • Pervasive Visibility and Control
  • Modern Multi-Factor Authentication
  • Risk-based Authentication
  • Assurance Levels

VMware ThinApp

Designed to eliminate application conflicts and streamline management, VMware® ThinApp® simplifies application virtualization and reduces the cost and complexity of application delivery. As a key component of VMware View™, ThinApp adds application compatibility to virtual desktop environments and helps to reduce the management burden of desktop applications and images. Key Benefits
  • Simplify Windows 7 migrations.
  • Eliminate application conflicts.
  • Minimize costly recoding and regression testing.
  • Streamline application management.
  • Reduce IT support and help desk costs.
  • Strengthen endpoint security.
  • Increase workforce mobility.
  • Get integrated application assignment
ThinApp is an agentless application virtualization solution that isolates applications from their underlying operating systems to eliminate application conflict and streamline application delivery and management. ThinApp virtualizes applications by encapsulating application files and registry into a single ThinApp package that can be deployed, managed and updated independently from the underlying operating system (OS). The virtualized applications do not make any changes to the underlying OS and continue to behave the same across different configurations for compatibility, consistent end-user experiences and ease of management.

ESET Secure Authentication

ESET Secure Authentication provides powerful software-based two-factor authentication (2FA), safeguarding your company’s mobile workforce against data breaches due to compromised passwords and aiding in regulatory compliance with HIPAA, PCI DSS and NIST. ESET Secure Authentication validates each VPN and Outlook Web Access (OWA) login with a unique one-time-password (OTP) adding an important layer of security to your company’s sensitive data. ESET Secure Authentication helps businesses access their data securely. This solution utilizes the existing Active Directory domain, allowing you to set up ESET’s two-factor authentication in just 10 minutes – and thus easily reduce the risk of data breaches, caused by stolen, weak or compromised passwords. The solution consists of the server side and the client side – the latter comes in the form of a mobile app. The authentication options include Push Authentication, as well as generation and delivery one-time passwords (OTPs) via the mobile app, but also via SMS messages or your organization’s existing hardware tokens. Use ESET Secure Authentication to protect:
  • Access to your company’s VPN
  • Remote Desktop Protocol
  • Additional authentication for desktop login (signing into an operating system)
  • Web/cloud services via Microsoft ADFS 3.0, such as Office 365
  • Microsoft Web Apps, such as OWA
  • Exchange Control Panel & Exchange Administrator Center
  • VMware Horizon View
  • RADIUS-based services

Cisco Duo

Follow us for more blog posts! Multi-factor authentication from Cisco's Duo protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Duo is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates easily with your existing technology. Duo’s 2FA solution only requires your users to carry one device — their smartphone, with the Duo Mobile app installed on it. Duo Mobile is available for both iPhones and Android, as well as wearables like the Apple Watch. While 2FA protects against a multitude of threats, the most common threats includes:
  • Stolen Passwords
  • Social Engineering
  • Phishing Attempts
  • Key Logging
  • Brute-Force Attacks