IT security made easy

The issues of data protection and data security play a prominent role as digitalisation affects almost all areas of life. Here, the requirements on access management are constantly rising. After all, besides security, the user experience is more important today than ever before. Apart from that, cyber crime is growing. In addition to password theft, phishing and social engineering attacks have become a real threat for many companies in the digital age. The understandably high degree of sensitivity among policymakers, the media, companies and customers makes the need for data security one of the most pressing issues of our time.

What’s clear is that digitally available, sensitive data should only be provided to authorised persons. In order to ensure the security of this data, nowadays it’s no longer enough to use a trusted but often very simple and insecure password. Data security and protection require another security step – a second factor.

2FA – flexible use, wherever and whenever

By now, almost everyone has used two factor authentication (2FA). After all, it has become well established in the banking sector. Anyone who conducted their banking transactions online 15 years ago will be familiar with printed TAN lists. Here, the password query during login represents the first factor (knowledge factor), while entering a TAN from a printed list is the second factor (possession factor). Naturally, printed lists with hand-typed TANs no longer play a role today – in part due to user-friendliness. Meanwhile, users often confirm a payment by fingerprint with the use of a smartphone app. The principle of two factor authentication has not changed, however, not least because the EU has required it since September 2019.

Another area that calls for a similarly high standard of protection for sensitive data is the insurance industry. Digital patient files, pension fund data or claims reports – many insurance companies provide their customers with contracts and customer data in convenient apps or customer portals. Here, data security can likewise be ensured with user-friendly two factor authentication.

Even in other areas, a lot has become easier and faster as a result of digitalisation, but this has also come with a need for additional protection. A good example is industry, where quick checks and machine adjustments are often required in production. Thanks to 2FA, this is now not only possible with physical presence. For instance, if the production manager attends an unscheduled meeting, they can carry out any changes on the go using a mobile device. That’s because a second factor for authenticating identity is also required here for the protection of sensitive data.

Modern requirements, modern solutions: Airlock’s 2FA

As you can see, 2FA can be used for a wide range of applications. The different types of 2FA are just as varied. Depending on the requirements on security, user-friendliness and costs, a number of methods are possible – all of which are supported by Airlock cIAM:

 

TechnologySecurityUser-
Experience
ManagementCosts
Certificate++----
TAN lists---~
Matrix cards~--~
mTan-~~~
Hardware OTP+~--
Software OTP+~~++
Push+++~+
QR Code with OTP++~~~
QR Code without OTP++---
Biometric with hardware++~---
Biometric with smartphone+++~~
FIDO-2+++~~
FIDO-1+~---
Automated Call+~~~
E-Mail OTP~~~+
PSE++----

Airlock’s One-Touch and Zero-Touch 2FA options provide maximum convenience combined with top security. All you need is a smartphone. With the One-Touch method, you receive a push message on your smartphone that you need to confirm with a tap. With the Zero-Touch method – as the name suggests – not even a tap is necessary. The automatic matching between the smartphone and browser means no further interaction is needed – you can’t get more user-friendly than that!

The advantage of Airlock’s 2FA also lies in its flexibility: the strong authentication with a second factor can also work without a smartphone and Internet access, if necessary. Authentication is then based on a hardware taken, a pass code or a QR code and can therefore be easily opened offline.

Airlock’s 2FA – resource-saving and ready to use

In general, switching to a new authentication method is time and cost-intensive. Airlock’s 2FA is proof of the opposite. Airlock’s 2FA requires no technical integration, since the solution is ready to use instantly and saves valuable resources. Thanks to the convenient app for Android and iOS, Airlock cannot only promise a short time-to-market, it also delivers. Combined with Airlock IAM, all you need is a license and just a few minutes of configuration – nothing more!

Moreover, Airlock’s 2FA offers extensive self-service features including password reset, management of registered smartphones and much more. This allows you to save additional helpdesk costs.

Besides high security, user self-services and the quick time-to-market, customers benefit from an elegant design and excellent user experience – which is more important today than ever before.

2FA helps make internal processes simpler for customers and employees. Airlock’s 2FA shows that strong IT security doesn’t have to be complicated.

 

Tutorials

Learn in our Pro Tutorials how easy, fast and secure the login with Airlock 2FA works.

To the Tutorials

Whitepaper Airlock 2FA

The two-factor authentication (2FA, MFA or SCA for short) in the area of IT security offers double the security. In combination with efficient customer identity & access management (cIAM), numerous processes are significantly simplified.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request 2FA whitepaper

Blognews directly to your inbox

The Airlock Newsletter informs you continuously about new blog articles.

Subscribe blognews

Comments 0

Information for you

-Our whitepapers-

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge