Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
AuthLite provides security for your Windows enterprise network authentication while remaining budget-friendly. Distinct from other multi-factor authentication solutions, its innovative technology enables your Active Directory to natively support two-factor authentication. This means you can continue utilizing your current software seamlessly while integrating additional two-factor security exactly where it is required. Furthermore, AuthLite mitigates the "Pass the Hash" (PtH) attack risk on administrative accounts by restricting user privileges effectively. It mandates two-factor logon prior to granting access to the domain admins group SID. AuthLite is compatible with your existing RDP servers and applications, requiring no modifications to the RDP client software or drivers. Even in offline scenarios, your account remains safeguarded by two-factor authentication. The solution leverages the robust cryptographic HMAC/SHA1 Challenge/response capability of the YubiKey token, ensuring secure cached and offline logon. Thus, AuthLite not only enhances security but also maintains the functionality and convenience that enterprises require.
Description
If you're in search of a robust enterprise-level solution for two-factor authentication (2FA) or multi-factor authentication (MFA) that can effectively protect a variety of popular business applications while offering numerous authentication options, you've come to the right spot. Deepnet DualShield stands out as a comprehensive multi-factor authentication platform that integrates multiple authentication techniques, protocols, and user experiences seamlessly. Beyond its core MFA capabilities, DualShield also features self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM), and Adaptive Authentication functionalities. This system is recognized as one of the most effective and adaptable multi-factor authentication solutions available globally. Furthermore, Deepnet DualShield can be deployed either on-site or within a private cloud environment, granting you complete oversight of your user authentication processes and ensuring that your users' identities and credentials remain secure. With its versatility, DualShield not only enhances security but also streamlines user access across your organization.
API Access
Has API
API Access
Has API
Integrations
Microsoft 365
Active Directory
Amazon Web Services (AWS)
Cisco Adaptive Security Appliance (ASA)
Google App Engine
Google Authenticator
Microsoft Outlook
Microsoft SharePoint
NetMotion
OpenVPN
Integrations
Microsoft 365
Active Directory
Amazon Web Services (AWS)
Cisco Adaptive Security Appliance (ASA)
Google App Engine
Google Authenticator
Microsoft Outlook
Microsoft SharePoint
NetMotion
OpenVPN
Pricing Details
$500 per year
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
AuthLite
Country
United States
Website
www.authlite.com
Vendor Details
Company Name
Deepnet Security
Founded
2005
Country
United Kingdom
Website
deepnetsecurity.com/multi-factor-authentication/
Product Features
Product Features
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Single Sign On
Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service