In today’s world of ubiquitous network connectivity and constant threats of inappropriate data usage, it is more important than ever before to take steps to ensure that the persons accessing your network, server and data assets are appropriately authorized to have that access.
In the past, a userid and password may have been sufficient for authorization. The problem with this approach is that these two pieces of information are things you “know” which makes it possible for the information to be stolen or cracked. An increasingly popular way to add assurance to the access process is to add a second credential in the form of something that you “have” such as a biometric element (e.g. fingerprint, retina scan, etc) or some kind of temporary token.
Token based systems are the most common solution but are expensive to procure / implement and a burden to maintain. Identity Automation’s two-factor solution is token based but uses the user’s cell phone and SMS as the delivery platform. This approach removes the hassle of maintaining a separate and dedicated token system and doesn’t require the user to carry and keep track of an additional piece of equipment. Our solution also takes the approach of leveraging the existing authentication mechanism for the system that you are granting access to thus eliminating the need to inject additional complexities into your environment.
If you would like to be contacted by a Sales Representative, please submit your contact information and we will contact you as quickly as possible.