As desktops and data move to the Cloud, the line between work and personal space is blurred.
The solutions of yesterday are no longer enough to ensure the security of corporate networks.
The Choice Cloud Development Team recognized this and stepped up to create a better solution.
Usernames and Passwords are no longer secure
As desktops and data move to the Cloud, the line between work and personal space is blurred.
The solutions of yesterday are no longer enough to ensure the security of corporate networks.
The Choice Cloud Development Team recognized this and stepped up to create a better solution.
Introducing Two Factor Authentication:
The new 2FA add-on completes the fundamental arsenal (Active Directory, Web credentials, SSL certificates…) by adding an extra layer of security to the Choice Cloud Web Application Portal.
This new add-on is available with the Choice Cloud Version 12 release as a 30-days trial for an unlimited number of users!
How Does It Work?
It combines two different factors to complete the login process and to achieve a greater level of security:
- The user credentials (Logon/Password)
- A secure code (generated by the authenticator app on Smartphone/Tablet/Smart watch)
Benefits:
- Quick, intuitive and simple to implement: Download an authenticator app and scan the QR code that appears the first time you log in!
- Works with Choice Cloud Web Portal: Use the same code if it’s the same device!
- Works even if the device is offline: Avoid SMS and voice security issues!
- Dynamic, one-time number combinations (reset every 30 sec): The code cannot be reused!
- Cost-effective: Other 2FA Solutions charge for each user license. The Choice Cloud 2FA Add-on is licensed per server. The same cost no matter how many users you have!
- Multi-Platform Compatibility: Authenticator apps are available for all common mobile systems and devices.
- Authy
- Google Authenticator
- Microsoft Authenticator
Security Above All Else
Even with Two Factor Authentication, Administrators must be prepared for a vast array of security threats. Ransomware attacks are on the rise.
As the tools to create them become more sophisticated, the tools to fight them must be powerful as well as adaptable.