Defender software tokens

loading

Defender - Dashboard

Defender - Dashboard

The main dashboard for the management portal gives you a quick view of the health of your Defender environment.

Defender - Portal

Defender - Portal

Defender comes with a web-based management portal that can be configured to provide information and the ability to action on that information based on the policy you define.

Defender - Helpdesk

Defender - Helpdesk troubleshooter

With the helpdesk troubleshooter you can quickly find information on a user who is having problem by either searching on their name or just click the magnifying glass to display all users

Defender - Helpdesk

Defender - Helpdesk

Once you have found the user, you can view a list of their current authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps.

Defender - User management

Defender - User management

Under management you can assign or remove tokens and passwords, test or reset tokens or set a pin for a token. In addition you can provide users with a temporary token response, as well as reset or unlock their account.

Defender - Token deployment system

Defender - Token deployment system

You can configure the token deployment system to show whether or not you would like your users to be able to request or assign tokens to their account and which types of hardware and software tokens you would like them to be able to do this for.

Defender - Self service

Defender - Self service

With Defender self-service users can then securely request and or register a token for their account.

Defender - Scheduled reports

Defender - Scheduled reports

In the reports section of the management console you can generate a one-off report, view the reports that are scheduled or that have been previously generated.

Two-factor authentication made easy

  • Use the redundancy, security and scalability of Active Directory
  • Enable users to self register any token based on pre-defined policy
  • Manage tokens and deployment, and view reports via the web
  • Utilize the full lifespan of hardware tokens and soft tokens that never expire
  • Troubleshoot, diagnose and resolve problems from any web browser

Soft Token for Android

Android

The Soft Token for Android enables users to use their Android phone as a token. Your users can use this token with Defender for two-factor authentication. Users can download the token from the Android Market, or use the following link on an Android device:

Download the Soft Token for Android

Back To Top

Soft Token for BlackBerry

BlackBerry

The Soft Token for BlackBerry enables users to use their BlackBerry device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for BlackBerry versions 5,6,7

Download the Soft Token for BlackBerry 10

Back To Top

Soft Token for iOS

iPhone Token

The SoftToken for iOS enables users to use their iPhone as a token. Your users can use this token with Defender for two-factor authentication

Download the Software Token for iOS

Back To Top

 

GrIDsure Token

GrIDsure

The Defender GrIDsure Token enables two-factor authentication without the need to deploy additional hardware or software to users. Users create a personalized identification pattern, or PIP, by selecting a series of cells on a grid and then registering them. This PIP is then used to create a one-time password that can be used to authenticate a user by selecting the numbers that match their PIP from a unique grid of numbers.

Back To Top

 

Soft Token for Windows Phone

Soft Token for Windows Phone;

The Soft Token for Windows Phone enables users to use their Windows Phone as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Phone

Back To Top

Soft Token for Java

Soft Token for Java

The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Java

Back To Top

Soft Token for Windows

Desktop Token

Installing the Soft Token for Windows token software on a PC or laptop enables a more secure connection between that device and your corporate assets. It authenticates users in the same way as a Dell hardware token.

When you install the Soft Token for Windows on your PC or laptop, you have the option of storing the token in multiple local folders, on a USB eToken, or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device allows you to authenticate to your corporate assets from any of your PCs. When installed on a PC or laptop, you can rename your tokens to make them more memorable, as well as protect them with a passphrase for increased security.

For supported applications, this token also allows you to authenticate by entering a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator for a more user-friendly and simple authentication process.

Download the Soft Token for Windows

Back To Top

SMS Token

Defender Mobile Token

The SMS Token is a plug-in to Defender. No additional software is required on the user’s systems, and the administrator can easily assign mobile tokens. Users can access the SMS Token in two ways, but the most popular reactive method is the following:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username.

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top

E-mail Token

Soft Token for E-mail

The Soft Token for E-mail is a plug-in to Defender.  No additional software is required on the user’s systems and the administrator can easily assign e-mail tokens. Users can access the token with these three easy steps:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top