2-FACTOR
AUTHENTICATION

Simple identification
with two factors.

SECURE
IDENTIFICATION

Powerful identification with a secure element and a PIN.

According to the EU IT Basic Protection Ordinance, in the future all companies will be obligated to take suitable measures to prevent unauthorized persons from accessing their IT systems. There are different identification options available, with the hardware-based version with PIN being the most user-friendly. The advantage of a hardware-supported system is that the encrypted material, such as the certificate, is saved separately from the device on a smart card. This type of 2-factor authentication has proven to be a highly reliable and secure system over the past few years. It is important to use a suitable secure element like the ONEKEY ID, where sensitive material is saved separate from devices like a laptop or tablet in an encrypted manner. This means unauthorized persons cannot access the protected data through malware, even if the computer itself is compromised. 

Certified Common Criteria Smart Cards are preferable to single-use passwords, since this allows protection of critical infrastructure such as energy sector IT systems or general basic services in a BSI conforming manner. 

SMART
CARD
LOGON

Secure login to Windows 10

One example for identification with a second factor is logging in on a desktop or laptop. Instead of a very strong password including special characters, numbers, and capital and lower case characters, the user only needs a smart card and at least a 4-digit PIN to log in.

.

2-FACTOR-
SOLUTIONS

Also available for mobile devices.

Discover solutions to integrate the second factor on mobile devices like tablets or smartphones too. Of course, these products also work on stationary devices like laptops or desktops.

ONEKEY ID

AirID

SECURE
ELEMENTS
FOR THE BEST
PROTECTION

AREAS OF APPLICATION

SINGLE SIGN ON TO WINDOWS 10

Single sign on to a Windows 10 computer. No matter whether it’s a desktop or Surface (Pro). With suitable smart card readers and a smart card, you can log in to your device securely and easily using a PIN.

AUTHENTICATION TO APPS

2-factor authentication is also recommended for apps to provide the best possible security in apps that access company content like a CRM. This step is recommended for all applications on mobile devices that access company content.

OTHER
SOLUTIONS

SECURE
CHAT

SECURE
PHONE CALL

SIGN
DOCUMENTS

PHYSICAL
ACCESS

FOR
DEVELOPERS

ABOUT
certgate

HAVE ANY
QUESTIONS?

We look forward to receiving your message






* Mandatory fields

certgate GmbH
Merianstraße 26
90409 Nuremberg
Tel.: +49 (0) 911 93 52 30
Email: info@certgate.com

 

By continuing to use this site, you accept the use of cookies. Further information

The cookie settings on this website are set to "Allow cookies" to enable the best browsing experience. By using this website without changing the cookie settings or clicking "Accept", you agree to this. Further information can be found in our privacy policy.

Close