Quick viewing(Text Mode)

Fischer Authenticator: Multifactor Authentication

Fischer Authenticator: Multifactor Authentication

Fischer Authenticator™ Multifactor and Passwordless Login

Passwords alone cannot provide adequate protection from unauthorized access, especially for high-value targets – including your IGA solution. Deploying multifactor authentication (MFA) will ensure that all users accessing your Fischer ecosystem will be secured with up to five factors of additional authentication.

STRONG SECURITY THAT DOESN’T GET IN THE USER’S WAY

Pattern PIN Bluetooth Fingerprint Geofencing Codes Codes Proximity Scan

Use either a simple End users create Insure that the Leverage Use the user’s “thumb slide,” a 4-digit PIN code user’s registered to validate the user’s location as part of “circle code,” or a known only to them. Bluetooth® device identity on sensor- the login evaluation. virtual, interactive PIN reset frequency is within close equipped mobile Deny access or combination lock. is controlled by proximity when they devices. increase factors your Fischer access try to authenticate. depending on where policies. the login occurs.

FISCHER INTERNATIONAL IDENTITY (239) 643-1500 [email protected] WWW.FISCHERINTERNATIONAL.COM MFA: THE TIME IS NOW! Given the scope of Identity Governance Go Passwordless, with Fischer! & Administration, it is now more You can only enforce entropy to a level acceptable to end users without burdening your help desk, and force important than ever that organizations users to change their so many times or in so many ways before the user experience begins to degrade. Want to provide multifactor authentication. empower your users with a consumer-grade user experience? With hackers charging forward, taking With Fischer, you can. Remove the burden of managing passwords. advantage of even the lowest profile of user to gain an edge on you, securing Extend the Power and Value of Your your high-profile users as well as your Fischer Investment Adding MFA to your Fischer ecosystem is simple and leverages end users has become a fundamental your identity and governance infrastructure already in place. pillar and necessary investment to • Benefit from existing Fischer processes and controls: more fully secure your operating access policies to determine the number of factors to environment. present, provision / deprovision MFA entitlements, approvals, user interfaces and more • Provide users with consistent processes and UX. Users visit Fischer Self-Service to request temporary access if their Intelligent, Contextual Access Control. mobile device is unavailable or lost Secure More Risk. • Eliminate duplicate MFA license, cost and administration Effective identity assurance requires more than establishing trust in “who” is logging in. Authenticator™ provides you with a richer picture of the risk each login event presents. The user’s There’s No Comparison current accounts, entitlements and location can all be used to dynamically determine the number and type of factors to Fischer Authenticator™ is the most advanced and effective enforce. Align authentication requirements with perceived risk. solution available for strong identity assurance. There’s no comparison with 2-factor or other MFA products.

Strong Authentication with Typical Fischer Extreme User Experience 2-Factor Auth Authenticator™ iOS ✓ ✓ Authenticator™ supports the three primary factors of authentication (knowledge, possession and inherence) in Android ✓ ✓ addition to location (geofencing), yet all factors are quick and easy to use. Users respond to authentication requests by Push Notification ✓ ✓ simply opening the Fischer Authenticator™ and Remote Logout not supported ✓ authenticating using the number and type of factors requested. Remote Device Unpair not supported ✓ OTP Generator ✓ no thanks Users are “Security Partners” Total # Auth Methods not supported ✓ While securing your environment is best left to your security experts, Fischer believes that a collaborative approach provides Fingerprint Scan not supported ✓ the strongest authentication model possible. Pattern Code not supported ✓ • You control the number and type of factors required to PIN Code not supported ✓ access your Fischer environment, but can allow end users Bluetooth Proximity not supported to select which factors they want to use ✓ • End users apply their own secrets that are never stored in Geofencing not supported ✓ your environment

FISCHER INTERNATIONAL IDENTITY (239) 643-1500 [email protected] WWW.FISCHERINTERNATIONAL.COM