Why use Multifactor Authentication?
The rise of the mobile workforce and emergence of cloud-based technologies requires organisations to provide secure and reliable user access to applications from any device on any network. That security must also be simple to deploy and seamless to use. Diamond’s Multifactor Authentication (MFA) solution fulfils these important organisational requirements.
What does Multifactor Authentication for my business involve?
Diamond’s MFA is simple to use and provides vastly improved security with the most trivial cost of time and effort. Once switched on, your employees install an authorised mobile app which they’ll require to log in along with their regular credentials. From that point on, people logging in will be protected by the simple process of confirming the login on the authorised mobile device, preventing intruders from logging into your system with stolen credentials.
What is Multifactor Authentication (MFA)?
Mutlifactor Authentication (MFA) is the use of more than just the one form of authentication. Traditionally a login credential requires a username and password. MFA is most often employed with just the two forms of authentication, which is known as 2-Factor Authentication (2FA).
What does it include?
Diamond’s MFA includes a secure and powerful cloud-based MFA platform with our fully managed services to support your staff on an ongoing basis. Our solution makes security seamless and straightforward, so you can focus on what’s important. Our scalable, cloud-based platform addresses security threats before they become a problem, by verifying the identity of your users and the health of their devices before they connect to the applications you want them to access — and because multi-factor requires more than just a username and password, cybercriminals can’t gain access to your applications.
Our MFA uses the principle of authentication through 1. Something I know (e.g. a user name and password) and 2. Something I have (an authorised mobile phone app). Using MFA means that if a staff member has had their login credentials compromised by social engineering or data theft, an intruder still won’t have access without the secondary (or tertiary) authentication method.