Defender Software Tokens

Soft Token for Android

Android

The Soft Token for Android is the latest addition to Quest's range of electronic security devices.The Quest Soft Token for Android enables users to use their Android phone as a two-factor authentication device. The Soft Token for Android can be used with Quest Defender to achieve two-factor authentication to resources. 

The Soft Token for Android can be downloaded from the Android Market or by using the following link on an Android device:

Download the Soft Token for Android
Back To Top

Soft Token for Blackberry

BlackBerry

Quest has developed the Desktop Token so that it integrates with the Blackberry's security mechanisms enabling a more secure connection between the device and your corporate assets. The Soft Token for BlackBerry enables Blackberry phones to authenticate the user in the same way as a Quest hardware token. The Soft Token for BlackBerry can be used with Quest Defender to achieve two-factor authentication to resources. 

Download the Soft Token for BlackBerry
Download the Soft Token for BlackBerry QNX

Back To Top

iPhone iToken

iPhone Token

Quest has developed the iPhone iToken so that it integrates with the iPhone's security mechanisms enabling a more secure connection between the device and your corporate assets. The iToken enables the iPhone to authenticate the user in the same way as a Quest hardware token. 


Download the iToken for iPhone

 Back To Top

Soft Token for Windows Phone

Soft Token for Windows Phone

 

Quest has developed the Soft Token for Windows Phone so that it integrates with the Windows Phone's security mechanisms enabling a more secure connection between the device and your corporate assets. The Quest Soft Token for Windows Phone enables Windows Mobile phones to authenticate the user in the same way as a Quest hardware token. The Soft Token for Windows Phone can be used with Quest Defender to achieve two-factor authentication to resources.

Download the Soft Token for Windows Phone

 Back To Top

Soft Token for Windows Mobile

Windows Mobile Token

 

Quest has developed the Soft Token for Windows Mobile so that it integrates with the Windows Mobile phone's security mechanisms enabling a more secure connection between the device and your corporate assets. The Quest Soft Token for  Windows Mobile enables Windows Mobile phones to authenticate the user in the same way as a Quest hardware token. The Soft Token for Windows Mobile can be used with Quest Defender to achieve two-factor authentication to resources. 

Download the Soft Token for Windows Mobile

 Back To Top

Soft Token for Java

Soft Token for Java

 

The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). This token can then be used with Quest Defender to authenticate the user using two-factor authentication.

Download the Soft Token for Java

 Back To Top

Soft Token for Palm

Palm

Quest has developed the Soft Token for Palm so that it integrates with the Palm phone's security mechanisms enabling a more secure connection between the device and your corporate assets. The Quest Soft Token for Palm enables Palm phones to authenticate the user in the same way as a Quest hardware token. The Soft Token for Palm can be used with Quest Defender to achieve two-factor authentication to resources. 

Download the Soft Token for Palm

 Back To Top

Soft Token for Windows Desktop

Desktop Token

 

Installing the Soft Token for Windows Desktop token software on a PC or laptop enables a more secure connection between that device and your corporate assets, authenticating the user in the same way as a Quest hardware token.

When you install the Desktop Token software on your PC or laptop you have the option of storing the token in multiple local folders, on a USB eToken or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device will allow you to authenticate to your corporate assets from any of your PCs. When installed on a PC or Laptop you can rename your tokens to make them more memorable, you may also protect them with a passphrase for increased security.

For supported applications, the Quest Desktop Token also allows you to choose to authenticate by only having to enter a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator. This simplifies the authentication process making it the ultimate in user-friendliness.

Download the Soft Token for Windows Desktop

 Back To Top

Soft Token for SMS

Defender Mobile Token 

The Soft Token for SMS is a plug-in to Defender, no additional software is required on the user’s system and the administrator can easily assign mobile tokens. The user can access the Defender Mobile token in two ways, the most popular reactive method is described below:

1. When the user attempts to access a resource protected by Defender, he is prompted to enter his username.

2. The user then enters his Defender PIN.

Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, the user receives the one-time password.

3. The user then re-enters the PIN and the one-time password at the prompt. If the information is entered correctly, the user is granted access.

 Back To Top

Soft Token for E-mail

Soft Token for E-mail 

The Soft Token for E-mail is a plug-in to Defender, no additional software is required on the user’s system and the administrator can easily assign e-mail tokens. The user can access the Soft Token for E-mails described below:

1. When the user attempts to access a resource protected by Defender, he is prompted to enter his username.

2. The user then enters his Defender PIN.

Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, the user receives the one-time password.

3. The user then re-enters the PIN and the one-time password at the prompt. If the information is entered correctly, the user is granted access.

 Back To Top