Sing In Cbass On RegSing In Cbass On TopSing Out

Defender software tokens

loading

Defender - Dashboard

Defender - Dashboard

The main dashboard for the management portal gives you a quick view of the health of your Defender environment.

Defender - Portal

Defender - Portal

Defender comes with a web-based management portal that can be configured to provide information and the ability to action on that information based on the policy you define.

Defender - Helpdesk

Defender - Helpdesk troubleshooter

With the helpdesk troubleshooter you can quickly find information on a user who is having problem by either searching on their name or just click the magnifying glass to display all users

Defender - Helpdesk

Defender - Helpdesk

Once you have found the user, you can view a list of their current authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps.

Defender - User management

Defender - User management

Under management you can assign or remove tokens and passwords, test or reset tokens or set a pin for a token. In addition you can provide users with a temporary token response, as well as reset or unlock their account.

Defender - Token deployment system

Defender - Token deployment system

You can configure the token deployment system to show whether or not you would like your users to be able to request or assign tokens to their account and which types of hardware and software tokens you would like them to be able to do this for.

Defender - Self service

Defender - Self service

With Defender self-service users can then securely request and or register a token for their account.

Defender - Scheduled reports

Defender - Scheduled reports

In the reports section of the management console you can generate a one-off report, view the reports that are scheduled or that have been previously generated.

Two-factor authentication made easy

  • Use the redundancy, security and scalability of Active Directory
  • Enable users to self register any token based on pre-defined policy
  • Manage tokens and deployment, and view reports via the web
  • Utilize the full lifespan of hardware tokens and soft tokens that never expire
  • Troubleshoot, diagnose and resolve problems from any web browser

Soft Token for Android

Android

The Soft Token for Android enables users to use their Android phone as a token. Your users can use this token with Defender for two-factor authentication. Users can download the token from the Android Market, or use the following link on an Android device:

Download the Soft Token for Android

Back To Top

Soft Token for Blackberry

BlackBerry

The Soft Token for Blackberry enables users to use their Blackberry device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for BlackBerry

Download the Soft Token for BlackBerry QNX

Back To Top

iPhone iToken

iPhone Token

The iPhone iToken enables users to use their iPhone as a token. Your users can use this token with Defender for two-factor authentication

Download the iToken for iPhone

Back To Top

 

Soft Token for Windows Phone

Soft Token for Windows Phone;

The Soft Token for Windows Phone enables users to use their Windows Phone as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Phone

Back To Top

Soft Token for Windows Mobile

Windows Mobile Token

The Soft Token for Windows Mobile enables users to use their Windows Mobile device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Mobile

Back To Top

Soft Token for Java

Soft Token for Java

The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Java

Back To Top

Soft Token for Windows Desktop

Desktop Token

Installing the Soft Token for Windows Desktop token software on a PC or laptop enables a more secure connection between that device and your corporate assets. It authenticates users in the same way as a Dell hardware token.

When you install the Desktop Token software on your PC or laptop, you have the option of storing the token in multiple local folders, on a USB eToken, or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device allows you to authenticate to your corporate assets from any of your PCs. When installed on a PC or laptop, you can rename your tokens to make them more memorable, as well as protect them with a passphrase for increased security.

For supported applications, this token also allows you to authenticate by entering a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator for a more user-friendly and simple authentication process.

Download the Soft Token for Windows Desktop

Back To Top

Soft Token for SMS

Defender Mobile Token

The Soft Token for SMS is a plug-in to Defender.  No additional software is required on the user’s systems, and the administrator can easily assign mobile tokens. Users can access the Defender Mobile token in two ways, but the most popular reactive method is the following:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username.

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top

Soft Token for E-mail

Soft Token for E-mail

The Soft Token for E-mail is a plug-in to Defender.  No additional software is required on the user’s systems and the administrator can easily assign e-mail tokens. Users can access the token with these three easy steps:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top