Defender tokens

Manage two-factor authentication for storage and proprietary databases

Two-factor authentication needs can vary widely based on security, budget and deployment considerations. Defender offers the flexibility to choose a solution that is right for you thanks to the tool’s support of OATH-compliant tokens and Dell’s strong relationships with all major token vendors.

Defender offers a wide variety of software and hardware authentication methods.

Software TokensHardware Tokens
Defender iTokenGo-6 Hardware Token
View all View all