IT security made easy

The issues of data protection and data security play a prominent role as digitalisation affects almost all areas of life. Here, the requirements on access management are constantly rising. After all, besides security, the user experience is more important today than ever before. Apart from that, cyber crime is growing. In addition to password theft, phishing and social engineering attacks have become a real threat for many companies in the digital age. The understandably high degree of sensitivity among policymakers, the media, companies and customers makes the need for data security one of the most pressing issues of our time.

What’s clear is that digitally available, sensitive data should only be provided to authorised persons. In order to ensure the security of this data, nowadays it’s no longer enough to use a trusted but often very simple and insecure password. Data security and protection require another security step – a second factor.

2FA – flexible use, wherever and whenever

By now, almost everyone has used two factor authentication (2FA). After all, it has become well established in the banking sector. Anyone who conducted their banking transactions online 15 years ago will be familiar with printed TAN lists. Here, the password query during login represents the first factor (knowledge factor), while entering a TAN from a printed list is the second factor (possession factor). Naturally, printed lists with hand-typed TANs no longer play a role today – in part due to user-friendliness. Meanwhile, users often confirm a payment by fingerprint with the use of a smartphone app. The principle of two factor authentication has not changed, however, not least because the EU has required it since September 2019.

Another area that calls for a similarly high standard of protection for sensitive data is the insurance industry. Digital patient files, pension fund data or claims reports – many insurance companies provide their customers with contracts and customer data in convenient apps or customer portals. Here, data security can likewise be ensured with user-friendly two factor authentication.

Even in other areas, a lot has become easier and faster as a result of digitalisation, but this has also come with a need for additional protection. A good example is industry, where quick checks and machine adjustments are often required in production. Thanks to 2FA, this is now not only possible with physical presence. For instance, if the production manager attends an unscheduled meeting, they can carry out any changes on the go using a mobile device. That’s because a second factor for authenticating identity is also required here for the protection of sensitive data.

Modern requirements, modern solutions: Airlock’s 2FA

As you can see, 2FA can be used for a wide range of applications. The different types of 2FA are just as varied. Depending on the requirements on security, user-friendliness and costs, a number of methods are possible – all of which are supported by Airlock cIAM:


Technology SecurityUser-
Management Costs
Matrix cards~--~
Hardware OTP+~--
Software OTP+~~++
QR Code with OTP++~~~
QR Code without OTP++---
Biometric with hardware++~---
Biometric with smartphone+++~~
Automated Call+~~~
E-Mail OTP~~~+

Airlock’s One-Touch and Zero-Touch 2FA options provide maximum convenience combined with top security. All you need is a smartphone. With the One-Touch method, you receive a push message on your smartphone that you need to confirm with a tap. With the Zero-Touch method – as the name suggests – not even a tap is necessary. The automatic matching between the smartphone and browser means no further interaction is needed – you can’t get more user-friendly than that!

The advantage of Airlock’s 2FA also lies in its flexibility: the strong authentication with a second factor can also work without a smartphone and Internet access, if necessary. Authentication is then based on a hardware taken, a pass code or a QR code and can therefore be easily opened offline.

Airlock’s 2FA – resource-saving and ready to use

In general, switching to a new authentication method is time and cost-intensive. Airlock’s 2FA is proof of the opposite. Airlock’s 2FA requires no technical integration, since the solution is ready to use instantly and saves valuable resources. Thanks to the convenient app for Android and iOS, Airlock cannot only promise a short time-to-market, it also delivers. Combined with Airlock IAM, all you need is a license and just a few minutes of configuration – nothing more!

Moreover, Airlock’s 2FA offers extensive self-service features including password reset, management of registered smartphones and much more. This allows you to save additional helpdesk costs.

Besides high security, user self-services and the quick time-to-market, customers benefit from an elegant design and excellent user experience – which is more important today than ever before.

2FA helps make internal processes simpler for customers and employees. Airlock’s 2FA shows that strong IT security doesn’t have to be complicated.



Learn in our Pro Tutorials how easy, fast and secure the login with Airlock 2FA works.

To the Tutorials

Whitepaper Airlock 2FA

The two-factor authentication (2FA, MFA or SCA for short) in the area of IT security offers double the security. In combination with efficient customer identity & access management (cIAM), numerous processes are significantly simplified.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request 2FA whitepaper

Blognews directly to your inbox

The Airlock Newsletter informs you continuously about new blog articles.

Subscribe blognews

Comments 0

Information for you

-Our whitepaper-

IT-security solutions

Digitalisation is presenting businesses with new challenges which go far beyond information technology. This primarily relates to an aspect which is becoming increasingly important: IT security.

Read our whitepaper to find out how IT-Security will become the pioneer of degitalization.

Request free of charge

Accelerate digitisation

To stay technically viable in this digital transformation, you must increasingly switch to hybrid cloud environments. This requires new security approaches as well as coordinated identity and access management.

Find out more in our whitepaper in collaboration with Deloitte, eperi and SHE.

Request free of charge

OWASP Top 10 for API Security

OWASP has created a new Top10 list for API Security. The top 10 listed reflect a broad consensus on what the most important API security issues are at the moment.

In our whitepaper you will learn how our Airlock API addresses the OWASP Top 10.

Request free of charge