Defender

loading

Defender - Dashboard

Defender - Dashboard

The main dashboard for the management portal gives you a quick view of the health of your Defender environment.

Defender - Portal

Defender - Portal

Defender comes with a web-based management portal that can be configured to provide information and the ability to action on that information based on the policy you define.

Defender - Helpdesk

Defender - Helpdesk troubleshooter

With the helpdesk troubleshooter you can quickly find information on a user who is having problem by either searching on their name or just click the magnifying glass to display all users

Defender - Helpdesk

Defender - Helpdesk

Once you have found the user, you can view a list of their current authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps.

Defender - User management

Defender - User management

Under management you can assign or remove tokens and passwords, test or reset tokens or set a pin for a token. In addition you can provide users with a temporary token response, as well as reset or unlock their account.

Defender - Token deployment system

Defender - Token deployment system

You can configure the token deployment system to show whether or not you would like your users to be able to request or assign tokens to their account and which types of hardware and software tokens you would like them to be able to do this for.

Defender - Self service

Defender - Self service

With Defender self-service users can then securely request and or register a token for their account.

Defender - Scheduled reports

Defender - Scheduled reports

In the reports section of the management console you can generate a one-off report, view the reports that are scheduled or that have been previously generated.

Two-factor authentication made easy

  • Use the redundancy, security and scalability of Active Directory
  • Enable users to self register any token based on pre-defined policy
  • Manage tokens and deployment, and view reports via the web
  • Utilize the full lifespan of hardware tokens and soft tokens that never expire
  • Troubleshoot, diagnose and resolve problems from any web browser

Overview

Defender enhances security by requiring two-factor authentication to gain access to your valuable network resources. Defender uses your current identity store within Microsoft® Active Directory® to enable two-factor authentication, taking advantage of its inherent scalability and security, and eliminating the costs and time involved to set up and maintain proprietary databases. Defender’s web-based administration, user self-registration and ZeroIMPACT migration capabilities ease the implementation of two-factor authentication for both administrators and users. In addition, Defender utilizes the full battery life of hardware tokens—typically 5 to 7 years—and offers software tokens that never expire.

Use the redundancy, security and scalability of Active Directory

Take advantage of the corporate directory already in place, using the scalability, security and compliance of Active Directory for two-factor authentication. User token assignment is simply an additional attribute to a user’s properties within Active Directory.

Enable users to self-register any token based on pre-defined policy

Enable users to request and/or receive hard or soft tokens based upon your pre-defined policy. Then quickly and easily assign those tokens to their accounts through a unique, secure mechanism. The token deployment system removes the entire administrative burden and associated costs of conventional manual token assignment.

Manage tokens and deployment, and view reports via the web

Provide administrators and end users options for token management, token deployment, real-time log viewing, help desk troubleshooting and access to reports using the web-based Defender Management Portal.

Utilize the full lifespan of hardware tokens and soft tokens that never expire

Make use of the full battery life of hardware tokens—typically 5 to 7 years—rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of incurring the costs associated with replacing tokens for all users simultaneously. In addition Defender offers software tokens that never expire.

Troubleshoot, diagnose and resolve problems from any web browser

Enable administrators to troubleshoot, diagnose and resolve problems quickly from any web browser. Authentication attempts and routes, with associated results and possible reasons for failures, are displayed with one-click resolution steps. User account details and assigned tokens are also shown, along with the ability to test, reset the pin, provide a temporary token response, or reset or unlock the account.

Features

Active Directory-centric
Take advantage of the corporate directory already in place, using the scalability, security and compliance of Active Directory for two-factor authentication. User token assignment is simply an additional attribute to a user’s properties within Active Directory.
Token self-registration
Users can request and/or receive hard or soft tokens based upon pre-defined administrator policy. Then quickly and easily assign those tokens to their accounts through a unique, secure mechanism. The token deployment system removes the entire administrative burden and associated costs of conventional manual token assignment.
Web-based administration
Provide administrators and end users options for token management, token deployment, real-time log viewing, help desk troubleshooting and access to reports using the web-based Defender Management Portal.
Token flexibility
Make use of the full battery life of hardware tokens—typically 5 to 7 years —rather than having a vendor-defined term. This enables you to replace tokens as they expire, in a business-as-usual process, instead of to all users at one time and incurring the costs associated with such a project. In addition, Defender offers software tokens that never expire.
Help desk troubleshooter
Enable administrators to troubleshoot, diagnose and resolve problems quickly from any Web browser. Authentication attempts and routes, with associated results and possible reasons for failures, are displayed with one-click resolution steps. User account details and assigned tokens are also shown with the ability to test, reset the pin, provide a temporary token response, or reset or unlock the account.
Universal soft token license
Defender offers a wide range of software tokens for the most popular and widely deployed mobile platforms. By offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms.
ZeroIMPACT migration
Defender can run in tandem with legacy systems. All user authentication requests are directed to Defender. If the user is not yet defined within Defender, the authentication request is passed via the proxy feature to the incumbent authentication solution. This allows administrators to migrate users to Defender as their legacy tokens expire, with virtually no overhead from an administrator or end-user perspective.
Secure webmail access
Enable secure web-based access to your corporate email system from any web browser anytime, anywhere with Dell Webthority, a reverse proxy solution included with Defender. In addition, you can require Defender token use for access to ensure appropriate authentication regardless of access point.
Pluggable Authentication Module (PAM)
Specify that services and users defined on your Unix/Linux systems be authenticated by Defender with its Pluggable Authentication Module (PAM).
Encryption
Secure communications by associating a Data Encryption Standard (DES) with the Defender Security Server. Defender supports AES, DES or Triple DES encryption.

Specifications

Defender security server (DSS)

Platform
  • Windows® 2003 (32-Bit or 64-Bit)
  • Windows 2008 (32-Bit or 64-Bit)
  • Windows 2008 R2 (32-Bit or 64-Bit)
  • Windows 2012 (32-Bit or 64-Bit)
  • Windows 2012 R2 (32-Bit or 64-Bit)
Memory
  • 512 MB
Hard disk space
  • 3 MB
  • Logging requires 1GB per DSS.

Defender administration console

Platform
  • Windows 2003 (32-Bit or 64-Bit)
  • Windows 2008 (32-Bit or 64-Bit)
  • Windows 2008 R2 (32-Bit or 64-Bit)
  • Windows 2012 (32-Bit or 64-Bit)
  • Windows 2012 R2 (32-Bit or 64-Bit)
  • Windows 7 (32-Bit or 64-Bit)
  • Windows XP (32-Bit or 64-Bit)
  • Windows Vista® (32-Bit or 64-Bit)
Memory
  • 128 MB
Hard disk space
  • 6 MB
Additional software
  • Microsoft® Active Directory Administration Tools

Defender management portal

Platform
  • Windows 2003 (32-Bit or 64-Bit)
  • Windows 2008 (32-Bit or 64-Bit)
  • Windows 2008 R2 (32-Bit or 64-Bit)
  • Windows 2012 (32-Bit or 64-Bit)
  • Windows 2012 R2 (32-Bit or 64-Bit)
Memory
  • 1 GB
Hard disk space
  • 200 MB
Additional software
  • Internet Information Services 6 or 7
  • Clients require Internet Explorer 7 or higher

Detailed requirements

Download free trial to see the full list of system requirements.

Resources