Defender allows you to make use of the full battery life of
hardware tokens—typically five to seven
years —rather than having a vendor-defined term. Replace tokens as they expire, in a business-as-usual process, instead of replacing
all users at one time and incurring the large aggregated costs associated with such a project. Plus, Defender offers
software tokens that never expire.
The Soft Token for Android enables users to use their Android phone as a token. Your users can use this token with Defender for two-factor authentication. Users can download the token from the Android Market, or use the following link on an Android device:
The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). Your users can use this token with Defender for two-factor authentication.
Installing the Soft Token for Windows token software on a PC or laptop enables a more secure connection between that device and your corporate assets. It authenticates users in the same way as a hardware token.
When you install the Soft Token for Windows on your PC or laptop, you have the option of storing the token in multiple local folders, on a USB eToken, or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device allows you to authenticate to your corporate assets from any of your PCs. When installed on a PC or laptop, you can rename your tokens to make them more memorable, as well as protect them with a passphrase for increased security.
For supported applications, this token also allows you to authenticate by entering a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator for a more user-friendly and simple authentication process.
The SMS Token is a plug-in to Defender. No additional software is required on the user’s systems, and the administrator can easily assign mobile tokens. Users can access the SMS Token in two ways, but the most popular reactive method is the following:
1. When users attempt to access a resource protected by Defender, they are prompted to enter their username.
2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, users receive a one-time password.)
3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.
The Soft Token for E-mail is a plug-in to Defender. No additional software is required on the user’s systems and the administrator can easily assign e-mail tokens. Users can access the token with these three easy steps:
1. When users attempt to access a resource protected by Defender, they are prompted to enter their username
2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, users receive a one-time password.)
3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.
The OneSpan Go-7 is very small, and features a high contrast LCD display and a single button. This combination offers the ultimate in user-friendliness and high security: One push on the button and the OneSpan Go-7 shows a unique one-time password on its LCD display. The user then enters this one-time password into their application login screen.