Defender product overview
Defender enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication. It takes advantage of AD’s inherent scalability and security to eliminate the time and expense involved with setting up and maintaining proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease implementation for administrators and users. Plus, Defender hardware tokens utilize their full battery life and provide software tokens that never expire.
Use the scalability, security and compliance of Active Directory (AD) to provide a two-factor authentication to any system, application or resource. You can take advantage of the corporate directory already in place, instead of creating an additional proprietary one — and save time and money. User token assignment is simply an additional attribute to the user object within AD.
Enable users to request a hard or soft token based upon policy defined by administrators, and then quickly and easily assign that token to their account through a secure mechanism. Token self-registration removes the entire administrative burden and associated costs of conventional manual token assignment.
Enable help desk and Defender administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any browser. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, Defender enables you to view user account details and assigned tokens, quickly test or reset the pin, provide a temporary token response, or reset or unlock the account.
Provide Defender administrators, help-desk administrators and end-users options for token management, token deployment, real-time log viewing, troubleshooting and reporting using the web-based Defender Management Portal.
Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire. View all available tokens.
Defender can run in tandem with legacy systems. All user-authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.
Defender offers a wide range of software tokens for most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.
Enable secure web-based access to your corporate email system from any web browser anytime, anywhere with Cloud Access Manager, a reverse proxy solution included with Defender. In addition, you can require Defender token use for access to ensure appropriate authentication regardless of access point.
Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).
Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.
The city of Bakersfield's Police Department locks down remote access with Defender
The Village of Westmont secures working environment with One Identity’s suite of IAM solutions
In this tech brief we will discuss the top five questions that you should ask before purchasing a two-factor authentication solution.
This technical brief explains how you can prove the identity of the other party in an e-transaction or exchange of information. It also describes why Defender is an excellent solution to help you accomplish this. Seamlessly integrated with Microsoft’s Act
see what percentage of IT pros access unauthorized resources and who snoops more execs or middle management, big companies or small.
Far-reaching State of IAM global survey, which collected data from more than 900 IT security professionals from around the globe, found sobering results
The following ten universal truths of IAM provide common-sense guidance on how to evaluate your need, implement a solid IAM solution and optimize its usage.