For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Defender

Two-factor authentication made easy with Enterprise 2FA

Our Enterprise 2FA solution, Defender, enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication. It takes advantage of AD’s inherent scalability and security to eliminate the time and expense involved with setting up and maintaining proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease implementation for administrators and users. Plus, Defender hardware tokens utilize their full battery life and provide software tokens that never expire.

Defender product overview 06:02

Features

Active Directory-centric

Use the scalability, security and compliance of Active Directory (AD) to provide a Windows 10 two-factor authentication to any system, application or resource. You can take advantage of the corporate directory already in place, instead of creating an additional proprietary one — and save time and money. User token assignment is simply an additional attribute to the user object within AD.

Token self-registration

Enable users to request a hard or soft token based upon policy defined by administrators, and then quickly and easily assign that token to their account through a secure mechanism. Token self-registration removes the entire administrative burden and associated costs of conventional manual token assignment.

Help desk troubleshooter

Enable help desk and Defender administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any browser using enterprise 2FA. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, Defender enables you to view user account details and assigned tokens, quickly test or reset the pin, provide a temporary token response, or reset or unlock the account.

Web-based administration

Provide Defender administrators, help-desk administrators and end-users options for token management, token deployment, real-time log viewing, troubleshooting and reporting using the web-based Defender Management Portal.

Token flexibility

Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire. View all available tokens.

ZeroIMPACT migration

The Enterprise 2FA solution, Defender, can run in tandem with legacy systems. All user-authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.

Universal soft token license

The Defender two-factor authentication solution offers a wide range of software tokens for most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.

Pluggable Authentication Module (PAM)

Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).

Encryption

Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.

Specifications

Resources

Datasheet

Defender

Protect your network resources with enterprise two-factor authentication
Case Study

Bakersfield Police Department locks down remote access with Defender

The city of Bakersfield's Police Department locks down remote access with Defender
Video

The Village of Westmont secures working environment with One Identity’s suite of IAM solutions

For the Village of Westmont, a Chicago suburb, One Identity solutions – : Defender, Password Manager and Cloud Access Manager –...
White Paper

Zero Trust and IT Security – A Global Survey of Security Stakeholders

Download a copy of the Global IT Security survey results to learn more details about the state of Zero Trust.
Technical Brief

Installing and Configuring Defender: The Quick Version

This guide will walk you through how you can quickly and efficiently install Defender.
E-book

eBook: Cyber resilience in the era of identity sprawl

This new eBook highlights ways your organization can bolster your defenses against modern attack methods
White Paper

Executive Summary | Exploring the current state of Zero Trust – awareness, adoption, and barrier...

One Identity recently commissioned a survey of 1,000 IT security professionals to see how the Zero Trust model is being impleme...
White Paper

Global Survey Results 2021 – Executive Summary: Understanding the trend toward unified identity ...

Read the executive summary of our annual global survey, “Understanding the trend toward unified identity security as a counterm...

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.