Defender software tokens

Soft Token for Android

Android

The Soft Token for Android enables users to use their Android phone as a token. Your users can use this token with Defender for two-factor authentication. Users can download the token from the Android Market, or use the following link on an Android device:

Download the Soft Token for Android

Back To Top

Soft Token for BlackBerry

BlackBerry

The Soft Token for BlackBerry enables users to use their BlackBerry device as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for BlackBerry versions 5,6,7

Download the Soft Token for BlackBerry 10

Back To Top

Soft Token for iOS

iPhone Token

The SoftToken for iOS enables users to use their iPhone as a token. Your users can use this token with Defender for two-factor authentication

Download the Software Token for iOS

Back To Top

 

GrIDsure Token

GrIDsure

The Defender GrIDsure Token enables two-factor authentication without the need to deploy additional hardware or software to users. Users create a personalized identification pattern, or PIP, by selecting a series of cells on a grid and then registering them. This PIP is then used to create a one-time password that can be used to authenticate a user by selecting the numbers that match their PIP from a unique grid of numbers.

Back To Top

 

Soft Token for Windows Phone

Soft Token for Windows Phone;

The Soft Token for Windows Phone enables users to use their Windows Phone as a token. Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Windows Phone

Back To Top

Soft Token for Java

Soft Token for Java

The Soft Token for Java enables users to install a token on their Windows, Mac OS X and Linux/Unix-based laptops and PCs that are running the Java Runtime Environment (JRE). Your users can use this token with Defender for two-factor authentication.

Download the Soft Token for Java

Back To Top

Soft Token for Windows

Desktop Token

Installing the Soft Token for Windows token software on a PC or laptop enables a more secure connection between that device and your corporate assets. It authenticates users in the same way as a Dell hardware token.

When you install the Soft Token for Windows on your PC or laptop, you have the option of storing the token in multiple local folders, on a USB eToken, or on a removable device such as a USB memory stick or iPAQ. Installing the token on a removable device allows you to authenticate to your corporate assets from any of your PCs. When installed on a PC or laptop, you can rename your tokens to make them more memorable, as well as protect them with a passphrase for increased security.

For supported applications, this token also allows you to authenticate by entering a PIN identity. The challenge/response dialog can be handled automatically by the Defender VPN Integrator for a more user-friendly and simple authentication process.

Download the Soft Token for Windows

Back To Top

SMS Token

Defender Mobile Token

The SMS Token is a plug-in to Defender. No additional software is required on the user’s systems, and the administrator can easily assign mobile tokens. Users can access the SMS Token in two ways, but the most popular reactive method is the following:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username.

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned mobile number as an SMS message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top

E-mail Token

Soft Token for E-mail

The Soft Token for E-mail is a plug-in to Defender.  No additional software is required on the user’s systems and the administrator can easily assign e-mail tokens. Users can access the token with these three easy steps:

1. When users attempt to access a resource protected by Defender, they are prompted to enter their username

2. They enter their Defender PIN. (Defender receives the request, generates a one-time password and automatically sends it to the assigned e-mail address in an e-mail message. Within seconds, users receive a one-time password.)

3. They re-enter their PIN and the one-time password at the prompt. If the information is entered correctly, access is granted.

Back To Top