Manage two-factor authentication for storage and proprietary databases.
Two-factor authentication needs can vary widely based on security, budget and deployment considerations. Defender offers the flexibility to choose a solution that is right for you thanks to the tool’s support of OATH-compliant tokens and Dell’s strong relationships with all major token vendors.
Defender authentication devices include tokens in three forms: hardware, software and web-based.
|Software Tokens||Hardware Tokens||Web-based Tokens|
|View all||View all||View all|