Elevate your security posture in accessing applications
Rating: 8 out of 10
IncentivizedUse Cases and Deployment Scope
Today we have several applications that are accessed on the internet, which we cannot accept that a simple exposure of a user password allows undue access to one or more of these applications. So to raise the level of protection to access performed by users, we use VIP as a two-factor authentication solution.
Pros
- Push authentication request.
- Credential wallet.
- Cloning protection.
Cons
- The API is no easy to use.
- The push functionality not always is quickly to alert in mobile.
- The migration feature is so hard to execute.
Likelihood to Recommend
Well Suited for
- Implement Multi-Factor Authentication to Enterprise Applications.
- Give the contributor a tool to protect their personal application accounts in the same app.
Less appropriate for
- Protect the desktop login process.
- Integrate with Virtual Private Network systems to protect the remote access to systems and servers inside the company.
- Implement Multi-Factor Authentication to Enterprise Applications.
- Give the contributor a tool to protect their personal application accounts in the same app.
Less appropriate for
- Protect the desktop login process.
- Integrate with Virtual Private Network systems to protect the remote access to systems and servers inside the company.
