WHY AREN'T PASSWORDS GOOD ENOUGH?
Relying on just usernames and passwords to secure your systems is no longer considered safe. Malicious attacks against governments, companies, and individuals are more and more common.
According to the 2020 Verizon’s Data Breach Investigations Report (DBIR), 43% data breaches were attacks on the web application, more than double the results from last year. 67% of breaches were due to credential theft, errors and social attacks. Therefore, it’s very important to find more secure ways to protect your data.
WHAT ARE AUTHENTICATION FACTORS?
An authentication factor is a piece of information used to authenticate a person's identity before granting a user access to an application or a data. The three most widely used authentication factors are:
Something you know: Personal identification number (PIN), a password or answers to “secret questions”
Something you have: A credit card, a smartphone, or security token
Something you are: Biometric identification including fingerprints, facial and voice recognition
Asking username and a password alone is the most common example of single-factor authentication. Two-factor authentication (2FA) involves two of the categories above. Multi-factor authentication (MFA) requires credentials from at least two or more categories. 2FA is a subset of MFA.
WHY ALTOSEC webVPN?
Easy setup: Enable MFA with just a few clicks with a centralized control for users and resources without any API integration and development effort.
Multiple authentication methods: Choose TOTP with Google Authenticator, security key or push notifications on your mobile phone depending on how you want users to authenticate.
SSO - Single Sign On: Improve user experience by enabling authentication across on-premises and SaaS applications.
Secure any web application: Protect your corporate web applications (web mail, HR portal, etc.) or protect login to administrative areas (DSL modem, IP Webcam, Wordpress admin page, etc.)
Flexible access control: Define who will be given access to which resource, what factors of authentication will be used.
Easy user management: Define the external users (i.e.contractors) on the admin portal while your employees use your corporate LDAP servers like Microsoft Active Directory or OpenLDAP.
Secure connectivity without VPN servers: Get rid of expensive and hard to manage VPN servers. Your users can connect securely from any device and anywhere in the world without any special software.
Auditing and reporting: Keep detailed logs for all logins and break-in attempts across all of your applications.
IoT SECURITY
Gartner reports that by the year 2020 more than 25% of identified attacks in enterprises will involve IoT.
The nature of many IoT devices is that they are always on and connected, making them prime targets for attackers to exploit.
IoT devices are often built on outdated/unsecure software and legacy operating systems that leave them vulnerable to attack.
IoT devices being increasingly used for DDoS attacks and as points of ingress for hackers to establish a presence on corporate network.
The easy-to-use interface of Altosec makes it simple for you to manage and control access to IoT devices remotely.