The internet is considered by many companies as a challenge in terms of their safety because employees must be able to access confidential information - even outside the office's 4 walls. Without the necessary security systems, comoanies risk that confidential information might fall into the wrong hands.
Two factor authentication consists simple of two components to identify and authenticate a user:
1. Something you know 2. Something that you have on
The two components strenghten the security better than just using a username and password. Hardware tokens have until now constituted the companent "something you have on" where a code is sent to the token to give the user access to the system. Hardware tokens however complicate the optimal use of the system. The flexibility of users is limited, since the solution requires that employees always have a token on them when they need access to enterprise systems, while the cost of acquisition and use of tokens is a growing problem for IT decision makers.
What is Secure Mobile Access?
Secure Mobile access is the successor to traditional hardware tokens. The system is server-based, allowing for authentication through the use of SMS/text messages sent directly to mobile phones. The user can access the system via a login page through the protected computer system. Secure mobile Access validates then the userID and password and then sends a one-time code directly to the mobile phone. If the transmitted code matches the entered userID, the user will then be able to log into the system.
Using Secure Mobile Access
Secure Mobile Access can be used to authenticate sers in any system such as Internet banking, web mail, ERP systems, web sites, Intra and Extranet and personal access to a number of defined areas (manufacturing facilities, airports etc.)