with two factors.
Powerful identification with a secure element and a PIN.
According to the EU IT Basic Protection Ordinance, in the future all companies will be obligated to take suitable measures to prevent unauthorized persons from accessing their IT systems. There are different identification options available, with the hardware-based version with PIN being the most user-friendly. The advantage of a hardware-supported system is that the encrypted material, such as the certificate, is saved separately from the device on a smart card. This type of 2-factor authentication has proven to be a highly reliable and secure system over the past few years. It is important to use a suitable secure element like the ONEKEY ID, where sensitive material is saved separate from devices like a laptop or tablet in an encrypted manner. This means unauthorized persons cannot access the protected data through malware, even if the computer itself is compromised.
Certified Common Criteria Smart Cards are preferable to single-use passwords, since this allows protection of critical infrastructure such as energy sector IT systems or general basic services in a BSI conforming manner.
Secure login to Windows 10
One example for identification with a second factor is logging in on a desktop or laptop. Instead of a very strong password including special characters, numbers, and capital and lower case characters, the user only needs a smart card and at least a 4-digit PIN to log in.
Also available for mobile devices.
Discover solutions to integrate the second factor on mobile devices like tablets or smartphones too. Of course, these products also work on stationary devices like laptops or desktops.
FOR THE BEST
AREAS OF APPLICATION
SINGLE SIGN ON TO WINDOWS 10
Single sign on to a Windows 10 computer. No matter whether it’s a desktop or Surface (Pro). With suitable smart card readers and a smart card, you can log in to your device securely and easily using a PIN.
AUTHENTICATION TO APPS
2-factor authentication is also recommended for apps to provide the best possible security in apps that access company content like a CRM. This step is recommended for all applications on mobile devices that access company content.