Defender software tokens

Soft Token for Android

Android

The Soft Token for Android enables users to use their Android phone as a token. Your users can use this token with Defender for two-factor authentication. Users can download the token from the Android Market, or use the following link on an Android device:

Download the Soft Token for Android

Back To Top

Soft Token for Blackberry

BlackBerry

The Soft Token for Blackberry enables users to use their Blackberry device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for BlackBerry

Download the Soft Token for BlackBerry QNX

Back To Top

iPhone iToken

iPhone Token

The iPhone iToken enables users to use their iPhone as a token. Your users can use this token with Defender for two-factor authentication

Download the iToken for iPhone

Back To Top

 

Soft Token for Windows Phone

Soft Token for Windows Phone;

The Soft Token for Windows Phone enables users to use their Windows Phone as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Phone

Back To Top

Soft Token for Windows Mobile

Windows Mobile Token

The Soft Token for Windows Mobile enables users to use their Windows Mobile device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Mobile

Back To Top

Soft Token for Java

Soft Token for Java

The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Java

Back To Top

Soft Token for Windows Desktop

Desktop Token

Installing the Soft Token for Windows Desktop token software on a PC or laptop enables a more secure connection between that device and your corporate assets. It authenticates users in the same way as a Dell hardware token.

When you install the Desktop Token software on your PC or laptop, you have the option of storing the token in multiple local folders, on a USB eToken, or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device allows you to authenticate to your corporate assets from any of your PCs. When installed on a PC or laptop, you can rename your tokens to make them more memorable, as well as protect them with a passphrase for increased security.

For supported applications, this token also allows you to authenticate by entering a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator for a more user-friendly and simple authentication process.

Download the Soft Token for Windows Desktop

Back To Top

Soft Token for SMS

Defender Mobile Token

The Soft Token for SMS is a plug-in to Defender.  No additional software is required on the user’s systems, and the administrator can easily assign mobile tokens. Users can access the Defender Mobile token in two ways, but the most popular reactive method is the following:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username.

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top

Soft Token for E-mail

Soft Token for E-mail

The Soft Token for E-mail is a plug-in to Defender.  No additional software is required on the user’s systems and the administrator can easily assign e-mail tokens. Users can access the token with these three easy steps:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top