Developers: | Protectimus Solutions |
Date of the premiere of the system: | 2016 |
Last Release Date: | 2016/08/02 |
Technology: | Cybersecurity - Authentication, Means of enciphering are cybersecurity |
Content |
Protectimus SLIM and SLIM mini - tokens for two-factor authentication.
2016
Protectimus Technologies are compatible to Citrix NetScaler Gateway
On August 2, 2016 the Protectimus company announced verification of compatibility of products of two-factor authentication by Citrix company with Citrix NetScaler Gateway.
Now two-factor authentication from Protectimus is available to all companies using Citrix NetScaler Gateway in the work.
Two-factor authentication is an information security standard without which the due level of protection of access to confidential data of employees and clients cannot be provided.
For Protectimus it was represented important - to provide to the companies a possibility of fast and easy solution integration of two-factor authentication with its security systems. Therefore the decision on development of a plug-in for integration with Citrix NetScaler Gateway under the RADIUS and SAML protocol was made.
Protectimus SLIM и SLIM mini
The Protectimus company provided new generation of hardware OTP of tokens of Protectimus SLIM and SLIM mini in March, 2016. The main feature of a new product is that it can be reprogrammed, using available NFC technology, having sewed new secret keys in tokens or having changed lifetime of the one-time password.
Tokens are executed in 2 form factors: the normal bank card of ISO/IEC 7810 of ID-1 (85.6 x 53.98 x 0.76 mm) also pass the card of 64 x 38 mm in size. The main feature of a new product is that it can be reprogrammed, using available NFC technology, having sewed new secret keys in tokens or having changed lifetime of the one-time password. This opportunity increases safety of use of two-factor authentication even more in general and also expands scope of tokens with popular social nets, such as Google, Facebook, Twitter, Dropbox, and other resources.What the reflashed tokens differ from normal in
In a normal hardware token the secret key is sewed at the plant. After that it is impossible to change it. For that time while OTP a token reaches the end user, it passes through several instances. In this chain there can be a producer, the intermediary, the company providing services of strict authentication, reseller, etc. It is impossible to forget that at some of these stages the secret key can be copied by the unfair employee. In the reflashed tokens of Protectimus of the SLIM series secret keys can be replaced easily. Thereby having secured the business and data of the users against a compromise.
If at the enterprise the solution of strict authentication implemented based on Google Authenticator is used, then specialists of this company can have a problem with connection of hardware tokens. In the similar solution of strict authentication secret keys are generated by the system. It is impossible to enter into a system ready hardware tokens with ready secret keys. In this case the reprogrammed OTP tokens will help to resolve an issue also. It is necessary only to sew in them the secret keys generated by a system.
Thanks to an opportunity to reuse the reflashed tokens they can be more profitable to the companies protecting accounts of the users by means of two-factor authentication. After removal of the user from a system, his token can be transferred to the new user, previously having reflashed.
The reflashed token – a universal token
Tokens of Protectimus are suitable for authentication on any resource using 2FA irrespective of who will provide secret key the server or a token - Amazon Bitbucket Dropbox Electronic Arts, to Facebook GitHub Google Apps KeePass Kickstarter, Microsoft account Salesforce.com Teamviewer VK, War Thunder and a great number of others.
The token can use a smart card at login from the mobile device (the tablet or the smartphone). Whereas the USB token for this purpose does not approach, in these gadgets simply there is no USB connector.