What is two-factor or multi-factor authentication?

Complete security without compromise

Two-factor (2FA) or multi-factor authentication (MFA) is an additional security layer for your business – helping to address the vulnerabilities of a standard password-only approach.

alt
alt

Your security supercharger

In today’s online environment, the rudimentary “username and password” approach to security is easy prey for cyber criminals. Many log-ins can be compromised in minutes, and private data (such as personal and financial details) is under increasing threat.

Multi-factor Authentication, also known as MFA or multi-step verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). This authentication method can be easily summed up as a combination of "something you have and something you know”.

Electrical Plant

Straightforward and steadfast

carerr

Straightforward and steadfast

Back in the early days of authentication, organisations were reliant on hardware tokens to generate a secure passcode. The type you’d associate with online banking. But that solution was clumsy and prone to unforeseen expenses – with tokens frequently lost, broken or expiring.

Modern tokenless systems use mobile devices to make roll-out and management much easier. Here at SecurEnvoy, we brought the first-ever tokenless two-factor authentication product to market. Our system employs a user’s device, with passcodes generated locally or delivered via SMS, voice calls, secure emails or via an app. The approach is supremely secure, and extremely cost effective too.

By deploying SecurEnvoy SecurAccess we were able to enhance the user experience. The fact that we were able to reduce the cost and administration overhead as well was a bonus.

Dave Mansfield

The right tool for the job

Two-factor and Multi-factor authentication solutions are used by businesses of all sizes – seeking to keep confidential data secure. They can help to lower the likelihood of identity theft, as well as phishing scams, because criminals cannot compromise log-ins with usernames and password details alone.

Authentication solutions can be shunned (or cause friction) if they require users to carry fobs around. This is where tokenless solutions come into their own. They make life easier for users (and for the IT departments who have to manage them). Tokenless solutions are faster, quicker and cheaper to set up and simple to maintain across many networks.

Right Tool