A revised risk management approach is driving legacy replacement:
By using open standards like FIDO U2F and OATH, and abstracting the implementation of a specific token from the core management and handling of tokens, LinOTP can easily support a broad range of hardware and software tokens.
Time-to-market is critical for all companies, and given the velocity with which business moves today, an investment in a security solution should deliver initial results in weeks, not months or years. Automated installation and a modular approach that integrates existing authentication services to add MFA capabilities will help speed adoption of a new solution.
User adoption can be eased when additional authentication appears a natural progression from existing security systems. LinOTP addresses these types of demands by offering, for example, a Token-Abstraction Layer and a Token-Database, which can even be secured by an HSM (Hardware-Security-Module) to support an extremely broad range of token-Types.
Equally, LinOTP caters for on premise as well as cloud implementations, which helps address the needs of clients who are concerned with data hosting and access regulations.
Disruption of existing systems is often a cause of friction and ideally, the existing IT landscape should not need to be disrupted or deinstalled. LinOTP's API-centric approach helps accelerate integration with existing tools, and reduces the need to revisit the existing technology infrastructure.
Data breaches are rapidly increasing in scale and frequency.
Single passwords aren't helping.
They are complex to remember, often shared and easy for hackers to crack. The average user has to manage 26 passwords and shares the same password amongst 5 systems. Once one profile is accessed, criminals inevitably try credentials on other popular applications such as social media and email provider sites. The only way to safeguard customers and employees is by introducing additional forms of authentication.
Read more here.
* Verizon Data Breach Investigations Report (DBIR), April 2016
** Identity Theft Resource Center Breach Report, Dec 2015
*** Ponemon Institute Report, 2016
The KeyIdentity 2FA Enterprise Platform provides a secure, flexible, integrated and transparent set of products to allow you the deployment of 2FA the way you need it. The modular and futureproof design of the KeyIdentity 2FA Enterprise Platform enables to integrate future authentication methods and technologies.
All products are based on the open source LinOTP core by KeyIdentity.