Manage two-factor authentication for storage and proprietary databases.
Two-factor authentication needs can vary widely based on security, budget and deployment considerations. Defender offers the flexibility to choose a solution that is right for you thanks to the tool’s support of OATH-compliant tokens and Dell’s strong relationships with all major token vendors.
Defender offers a wide variety of software and hardware authentication methods.
|Software Tokens||Hardware Tokens|
|View all||View all|