Multi-Factor Authentication

Protect who can access your online accounts and apps with itro's multi-factor authentication (MFA) security

If someone guesses or steals your login credentials, itro MFA’s two step identity check blocks unauthorised access to your online accounts and apps. As well as preventing network disruptions and data breaches caused by weak or stolen user credentials, we deliver and manage itro MFA from the cloud for easy set-up and management.

 

Moreover, our solution goes beyond traditional multi-factor authentication by incorporating innovative ways to identify users, such as our Mobile Device DNA. With our large ecosystem of 3rd party integrations, the strong protection we give you is consistently deployed wherever you need it, such as across your network, VPNs and cloud applications.

 

Even non-technical users find our mobile app easy and convenient to use.

What Is Multi-Factor Authentication (MFA)?

MFA, also known as 2FA, adds a second identity check to online login requests. 

 

After entering your user name and password to access an online account or app, itro MFA requests an additional factor to authenticate the request is not malicious.

 

Authentication factors include:

  • Something you know (password, PIN)
  • Something you have (token, mobile phone)
  • Something you are (fingerprint, face)

 

When logging on using itro MFA you will need:

  • your password
  • to approve your request via your mobile authenticator
  • the correct mobile phone DNA; and
  • (depending on your phone model) your fingerprint

 

to access your accounts and apps.

Benefits of MFA

Effective MFA Protection with Mobile Device DNA

Multi-factor authentication (MFA) requires users to supply the information they know (username and password), and information provided on something they have, as well as other factors that can be associated with the specific individual. AuthPoint provides a highly secure MFA product using a push message, QR code, or one-time password (OTP); and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, an attacker who clones a user’s device in an attempt to access a protected system would be blocked, since the device DNA would differ.

Easy-to-Use AuthPoint Mobile App

WatchGuard’s AuthPoint app allows users to authenticate right from their own phone! No need to carry key fobs or thumb drives; instead install and activate the AuthPoint app in seconds, and then use it to authenticate from a smartphone. It enables speedy push-based authentication as well as offline authentication using QR codes with the phone’s camera. The app is available in 11 languages and downloads free of charge from the AppStore and Google Play.

Broad Coverage with Web Single Sign-On

itro’s ecosystem includes dozens of 3rd party integrations with AuthPoint – allowing companies to require users to authenticate before accessing sensitive Cloud applications, VPNs and networks. AuthPoint supports the SAML standard, permitting users to log in once to access a full range of applications and services. In addition, the secure login feature provides online and offline authentication to Windows and Mac machines using the AuthPoint app.

Keep Hackers Off Networks, VPNs, Cloud Resources and Much More!

itro Cloud Platform

  • 100% Cloud-based management
  • Authenticator allocation and activation
  • Authentication policies based on groups and resources
  • Logs and reports
  • Role-based access
  • Intuitive, attractive user interface

AuthPoint Mobile App

Three authentication methods in one:  
  1. Push messages
  2. One-time passwords
  3. QR codes when offline
 
  • Mobile authenticator – no additional hardware to carry
  • 11 languages
  • Multi-token support
  • iOS and Android – free to download
  • PIN/biometrics protection (on certain devices)
  • Mobile device DNA – added authentication factor
  • Self-service mobile token migration to new devices

Authpoint Getaway

  • Corporate network gateway
  • AD and LDAP user authentication and sync
  • RADIUS proxy

Authpoint Agents

  • Integration with 3rd party applications without native MFA support
  • Computer login protection for Windows and macOS

Authpoint Ecosystem

  • Add MFA to Cloud resources, applications, database and web resources
  • Support for SAML and RADIUS standards
  • Comprehensive integration guides for many popular 3rd party solutions

Contact Us To Find Out More!

If you have any questions about MFA, IT Security and Support or just want to ask our friendly technical engineers some questions, contact us at [email protected] or call us on 1800 10 3000.


    Relevant News