Wednesday 31 July 2013

Three great alternatives to two-factor authentication via text-message

Description

As the online world is becoming risky day by day thus, Twitter has joined Google and Facebook in introducing two-factor authentication. If you are opting to this security tool then you need to enter a code which you have received via text message each time you log into the microblogging service. After considering the string of news organizations and big brands such as Jeep and Burger King, Twitter’s decision to provide two-factor authentication to its users is right. But it is not a good option for those organizations having many staff members posting to a single Twitter account. Make sure that for brands a hacked Twitter account is very disastrous. Well, let’s see the other three alternatives for two-factor authentication.
























Solution: 

Hardware Token: The YubiKey This is a small piece of hardware called YubiKey which looks like a USB stick. You can plug it to your computer’s USB port. Every time you log in to your website or system, you need to push a button on the YubiKey so as to generate a one-time password for validating your identity. It also has the ability to make NFC variant of the device called the Yubikey NEO. There are so many companies including Google, Microsoft, the U.S. Department of Defense and the government of Turkey which are equipping their employees, users and customers with YubiKey. With up to 5,000 users using Yubico’s hardware, software and services, an enterprise need to pay $13 per year. For smaller businesses, you can go for tray of 50 Yubikeys from Yubico’s web store. It is the one-time cost of $750 as well as it works with free version of YubiCloud.


A User’s Phone Location: Toopher








































This can be installed on a company’s website with just a few lines of code as well as it works through an app on a user’s phone. While a user log onto a site, the software verifies their identity by detecting which computer they are using and where their phone is physically located. After installing it, you can pair it with the web service. For the first time log-in, you need to give permission to the person logging onto your site. After that, you can opt for automatic permission so that the app can run in background and operates invisibly. For companies with 50 users or less, Toopher app is free. Above than that, it can be as high as $2.50 per user per month for internal deployments


A Smart Complement to Two-Factor Solutions
































It is different from two-factor authentication. This California-based Impermium protects websites and individual users from account hackers by using proprietary statistical and machine learning models to provide threat intelligence and risk-based authentication. Basically, it monitors the user behavior across all online territories, observe what devices people are using, their network as well as physical location of a person trying to login to a site. Impermium has two products: one for business users of software as a service platforms and another that protects companies’ websites. The one is called Accountability and another one is CloudSentry.

Thus, these are three alternatives to two-factor authentication. For more from the XpertCrewTM team, please follow us on Twitter @Techvedic or contact Techvedic’s computer support helpdesk, as per below contact-details:

U.S. +855-859-0057 (http://www.techvedic.com/ )

U.K. +800-635-0716 (http://www.techvedic.co.uk/ )

CA 1-855-749-5861 (http://www.techvedic.ca/ )

AU 1-800-197-298 (http://www.techvedic.com.au/ )

We would be more than happy to help you. We are available 24/7.

Keywords:-
Two-factor authentication, what is two factor authentication, rsa two factor authentication, open source two factor authentication, microsoft two factor authentication phone factor, two factor authentication solutions, multi factor authentication, two factor authentication vendors, 2 factor authentication two factor authentication options, two factor authentication token,securid rsa securid, rsa token,three factor authentication, dual factor, authentication security token,windows authentication


0 comments:

Post a Comment