More than ever, data is threatened by attacks or identity theft. Identity protection has, therefore, become critical and requires authentication solutions that meet the challenges of data security.
Passwords are no longer enough. Even a sophisticated password policy does not solve the problem: passwords become too complex, they are changed too frequently, etc.
MFA solutions meet this challenge: they promise a much higher level of security, without deteriorating the user experience.
Traditional password authentication relies solely on a single authentication factor: the password itself.
Multi-factor authentication relies on several factors - 2 in most cases - that greatly increase the level of security and the difficulty for hackers to steal a user's identity.
Here are some examples of frequently used authentication factor combinations:
Some MFA solutions require users to be equipped with hardware tokens, which adds time, cost, and burden to users.
In this case, organizations must choose between security and ease of use. They often limit strong authentication to situations where the risk is high enough to justify its drawbacks.
Smartcard Authentication, used in some banks, requires users to:
Security token authentication
Visual Guard MFA
Visual Guard offers an alternative to hardware tokens with a solution
combining a high level of security and extreme simplicity for the user.
Give your users, employees, and partners a simplified login experience without any hardware requirements.
VG Strong Authentication / MFA relies exclusively on software mechanisms to perform authentication.
It offers the same high level of security as hardware solutions, without hindering the user experience.
Users simply receive a code or a link by SMS or Email
Deploy immediately, easily and quickly your MFA Multifactor Authentication projects without changing your architecture. Accessible via a secure API, Visual Guard MFA adapts to your constraints without imposing new ones.
A PIN code or password can always be stolen and then used illegally.
To address this risk, some MFA solutions generate one-time passwords (OTP), valid for only a single session. If a hacker were to gain access to this password, he couldn't reuse it anyway!
By removing hardware tokens, you also eliminate all costs associated with purchasing hardware, distributing tokens to users and replacing broken or lost tokens.
By calling the Visual Guard API, the application can initiate a strong authentication whenever required.
Authentication methods provided by Visual Guard can be used in very flexible ways:
To ensure that the authentication service is always available, it relies on several independent server infrastructures, distributed in certified, fully redundant data centers.
The loss of connectivity of all but one server infrastructure would have zero impact on the availability of the authentication service.