Adaptive Multi-factor Authentication

Giving you heightened security, when needed.

A username and password are no longer enough to authenticate your users. Each day brings new stories of stolen identities and brands of all sizes falling victim to hackers. Weak or stolen user credentials are the preferred weapons used by hackers, and are behind approximately 76 percent of all network intrusions.

Hacking has become big business for criminals and is now the fastest growing crime type in the world. In more than 60% of a all network breaches the hackers simply log-in as a regular user and have undetected access to systems and data. With Multi-Factor Authentication from CensorNet you are effectively taking the hackers' perferred weapon away.

What makes CensorNet Multi-Factor Authentication more secure?

CensorNet Multi-Factor Authentication is adaptive, real-time, challenge-based and session-specific, and takes advantage of contextual information when validating the user, thereby protecting against identity theft and modern Internet threats.

Unlike solutions relying on pre-issued passocdes, CensorNet Multi-Factor Authentication only generates the passcodes once a challenge (username and password is validated) has been fulfilled.

Real-time solution
All passcodes are generated in real-time at the point of login. No pre-issued passocdes. No seed files to be hacked.

Session-specific passcodes
All passcodes are locked to the session-ID of each particular login attempt for maximum security. This reduces the attack surface from being accessible from any device to a single device.

Contextual-based OTPs
The OTP time validation period and delivery form adapts based on the context of the user.

GEO Fencing
Increase security by blocking access from high risk locations or regions.

Contextual user notifications
Users receive information about the GEO-IP location of their login to help identify possible man-in-the-middle attacks.

Protection against brute-force attacks
CensorNet Multi-Factor Authentication includes advanced brute-force and denial-of-service attack detection and protection.

Hardened security keeps your data safe
Our passodes are cryptographically strong random generated OTPs using FIPS-140 validated crypto modules and all communication between components is AES 256bit encrypted. Our platform itself is fully authenticoded and obfuscated.
How is CensorNet Multi-Factor Authentication more user-friendly?

CensorNet Multi-Factor Authentication leverages the one thing users always carry with them - their mobile phone. The solution is intelligent, intuitive and so convenient that end users will happily maintain compliance. Here are some of the components that enable a superior user experience with CensorNet Multi-Factor Authentication:

Automatic Failover
Easily set up highly sophisticated failover mechanisms to ensure that the OTPs always arrive. The solution can even adapt between delivery methods based on the login context of the user, e.g. the location.

Adaptive User Authentication
For even greater user convenience the solution can be configured to dynamically change the level of authentication needed based on e.g. where the users are located when logging in, what time they are logging in, and what network they are logging in from, and how many successful logins have been made from a particular location. For example, if the user is logging in from a trusted location such as the comfort of their home (where they have logged in from before), then they will not be prompted for an OTP in order to authenticate. On the other hand, if they are attempting to log in while travelingi.e. from an airport lounge or hotel with a public Wi-Fi then an OTP would be mandatory to gain access.

Status Feedback
CensorNet provides unique status feedback that enables the user to follow the login progress. Status feedback inspires user confidence and reduces the number of helpdesk calls.

Make innovative use of letter combinations to provide users with easy-to-read passcodes, helping support the smooth intuitive login process of CensorNet Multi-Factor Authentication.

    The CIOs Strategy Guide
      to Security the Cloud
    Best Practices for Security
      Remote Access with MFA

Friday, January 19, 2018    NwTech, Inc. 2017 All rights reserved.