For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Defender

Two-factor authentication made easy with Enterprise 2FA

Our Enterprise 2FA solution, Defender, enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication. It takes advantage of AD’s inherent scalability and security to eliminate the time and expense involved with setting up and maintaining proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease implementation for administrators and users. Plus, Defender hardware tokens utilize their full battery life and provide software tokens that never expire.

Defender product overview 06:02

Features

Active Directory-centric

Use the scalability, security and compliance of Active Directory (AD) to provide a Windows 10 two-factor authentication to any system, application or resource. You can take advantage of the corporate directory already in place, instead of creating an additional proprietary one — and save time and money. User token assignment is simply an additional attribute to the user object within AD.

Token self-registration

Enable users to request a hard or soft token based upon policy defined by administrators, and then quickly and easily assign that token to their account through a secure mechanism. Token self-registration removes the entire administrative burden and associated costs of conventional manual token assignment.

Help desk troubleshooter

Enable help desk and Defender administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any browser using enterprise 2FA. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, Defender enables you to view user account details and assigned tokens, quickly test or reset the pin, provide a temporary token response, or reset or unlock the account.

Web-based administration

Provide Defender administrators, help-desk administrators and end-users options for token management, token deployment, real-time log viewing, troubleshooting and reporting using the web-based Defender Management Portal.

Token flexibility

Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire. View all available tokens.

ZeroIMPACT migration

The Enterprise 2FA solution, Defender, can run in tandem with legacy systems. All user-authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.

Universal soft token license

The Defender two-factor authentication solution offers a wide range of software tokens for most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.

Secure webmail access

Enable secure web-based access to your corporate email system from any web browser anytime, anywhere with Cloud Access Manager, a reverse proxy solution included with Defender. In addition, you can require Defender token use for access to ensure appropriate authentication regardless of access point.

Pluggable Authentication Module (PAM)

Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).

Encryption

Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.

Specifications

Resources

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.