AccessAnywhere "One-Time" Password Solution
Strong Authentication to Secure Your Information
AccessAnywhere provides conclusive proof of a user's identity by requiring an individual to provide two pieces of identification: a username and PIN; which only they know, and a one-time use passcode that appears on the provisioned physical token. This combination of "what you know" and "what you have" is commonly referred to as two-factor authentication and makes it virtually impossible to steal or replicate a user's identity.
Preventing exploitation of web server vulnerabilities, hacker prevention and simply reducing password theft are all major drivers why AccessAnywhere delivers "one-time" random number passwords. Remote user security is essential for protecting sensitive company data that is being accessed by users that are outside of the companies trusted network.
Three interesting facts that support the use of "one-time" passwords
- Users share their passwords: In a survey carried out by PentaSafe Security, two-thirds of commuters at London's Victoria Station were more than happy to reveal their computer password in return for a ballpoint pen. Another survey found that nearly half of British office workers used their own name, the name of a family member or that of a pet as their password.
- Password theft is easy: According to Meta Group, the most common way for intruders to gain access to company systems is not technically related, but simply involves finding out the full name and username of an employee (easily deduced from an e-mail message), calling the help desk posing as that employee, and pretending to have forgotten the password.
- Technology is against you: There is well-known software on the market that can guess your passwords in a matter of seconds. Even the most complicated passwords can be broken by brute force in mere minutes.
AccessAnywhere enables companies to ensure trusted identities for remote and mobile employees and other external users. In turn, those identities can be verified with a high degree of certainty before granting access to protected resources.
Once security has been assured, you can capitalize on the many advantages of mobile and remote access, while effectively managing the associated risks and costs.