Defender product overview
Defender enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication. It takes advantage of AD’s inherent scalability and security to eliminate the time and expense involved with setting up and maintaining proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease implementation for administrators and users. Plus, Defender hardware tokens utilize their full battery life and provide software tokens that never expire.
Use the scalability, security and compliance of Active Directory (AD) to provide a two-factor authentication to any system, application or resource. You can take advantage of the corporate directory already in place, instead of creating an additional proprietary one — and save time and money. User token assignment is simply an additional attribute to the user object within AD.
Enable users to request a hard or soft token based upon policy defined by administrators, and then quickly and easily assign that token to their account through a secure mechanism. Token self-registration removes the entire administrative burden and associated costs of conventional manual token assignment.
Enable help desk and Defender administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any browser. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, Defender enables you to view user account details and assigned tokens, quickly test or reset the pin, provide a temporary token response, or reset or unlock the account.
Provide Defender administrators, help-desk administrators and end-users options for token management, token deployment, real-time log viewing, troubleshooting and reporting using the web-based Defender Management Portal.
Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire. View all available tokens.
Defender can run in tandem with legacy systems. All user-authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.
Defender offers a wide range of software tokens for most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.
Enable secure web-based access to your corporate email system from any web browser anytime, anywhere with Cloud Access Manager, a reverse proxy solution included with Defender. In addition, you can require Defender token use for access to ensure appropriate authentication regardless of access point.
Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).
Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.
Your computer must be running one of the following operating systems (with or without any Service Pack):
Your computer must be running one of the following operating systems (with or without any Service Pack):
Your computer must be running one of the following operating systems (with or without any Service Pack):
Download free trial to see the full list of system requirements.
Enhance security with two-factor authentication.
The city of Bakersfield's Police Department locks down remote access with Defender
For the Village of Westmont, a Chicago suburb, One Identity solutions – : Defender, Password Manager and Cloud Access Manager – mean a safe, easy-to-use and secure working environment for employees and peace of mind for IT managers
In this tech brief we will discuss the top five questions that you should ask before purchasing a two-factor authentication solution.
This technical brief explains how you can prove the identity of the other party in an e-transaction or exchange of information. It also describes why Defender is an excellent solution to help you accomplish this. Seamlessly integrated with Microsoft’s Act
To better understand how agencies can leverage the NIST Cybersecurity Framework to navigate the changing threat landscape, GovLoop partnered with Quest, a leader in helping build and manage modern, secure and more resilient IT architecture.
Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what to do to fix them -- but do not have the time nor resources to do anything about it.
Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what to do to fix them -- but do not have the time nor resources to do anything about it.
Secure your organization and keep your users productive.
Enable two-factor authentication for IBM System z mainframe networks or single business transactions
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.