For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Defender

Two-factor authentication made easy with Enterprise 2FA

Our Enterprise 2FA solution, Defender, enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication. It takes advantage of AD’s inherent scalability and security to eliminate the time and expense involved with setting up and maintaining proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease implementation for administrators and users. Plus, Defender hardware tokens utilize their full battery life and provide software tokens that never expire.

Defender product overview 06:02

Features

Active Directory-centric

Use the scalability, security and compliance of Active Directory (AD) to provide a Windows 10 two-factor authentication to any system, application or resource. You can take advantage of the corporate directory already in place, instead of creating an additional proprietary one — and save time and money. User token assignment is simply an additional attribute to the user object within AD.

Token self-registration

Enable users to request a hard or soft token based upon policy defined by administrators, and then quickly and easily assign that token to their account through a secure mechanism. Token self-registration removes the entire administrative burden and associated costs of conventional manual token assignment.

Help desk troubleshooter

Enable help desk and Defender administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any browser using enterprise 2FA. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, Defender enables you to view user account details and assigned tokens, quickly test or reset the pin, provide a temporary token response, or reset or unlock the account.

Web-based administration

Provide Defender administrators, help-desk administrators and end-users options for token management, token deployment, real-time log viewing, troubleshooting and reporting using the web-based Defender Management Portal.

Token flexibility

Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire. View all available tokens.

ZeroIMPACT migration

The Enterprise 2FA solution, Defender, can run in tandem with legacy systems. All user-authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.

Universal soft token license

The Defender two-factor authentication solution offers a wide range of software tokens for most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.

Secure webmail access

Enable secure web-based access to your corporate email system from any web browser anytime, anywhere with Cloud Access Manager, a reverse proxy solution included with Defender. In addition, you can require Defender token use for access to ensure appropriate authentication regardless of access point.

Pluggable Authentication Module (PAM)

Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).

Encryption

Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.

Specifications

Resources

Datasheet

Defender

Protect your network resources with enterprise two-factor authentication
Case Study

Bakersfield Police Department locks down remote access with Defender

The city of Bakersfield's Police Department locks down remote access with Defender
Video

The Village of Westmont secures working environment with One Identity’s suite of IAM solutions

For the Village of Westmont, a Chicago suburb, One Identity solutions – : Defender, Password Manager and Cloud Access Manager –...
White Paper

Top five questions you should ask before purchasing a two-factor authentication solution

In this tech brief we will discuss the top five questions that you should ask before purchasing a two-factor authentication solution.
Technical Brief

Defender - The Right Way to Prove Identity and Establish Trust

This technical brief explains how you can prove the identity of the other party in an e-transaction or exchange of information....
White Paper

Global Survey Results 2021 – Executive Summary: Understanding the trend toward unified identity ...

Read the executive summary of our annual global survey, “Understanding the trend toward unified identity security as a countermeasure...
E-book

eBook: Cyber resilience in the era of identity sprawl

This new eBook highlights ways your organization can bolster your defenses against modern attack methods
White Paper

Global Survey Key Findings

Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what...

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.