First, they're likely the most widely used hardware tokens in existence, with incredibly broad ecosystem support. Yubico's products have two big things going for them. Some will no doubt balk at the risks inherent in any wireless authenticator, but this concern should be balanced against the reality that there are currently few viable non-wireless PKI solutions for most mobile devices.Īs was the case with RSA and Gemalto, Deepnet's visual OTP tokens are vulnerable to both code and physical theft, making the PKI offerings more compelling when practical.įactoid: Deepnet's SafeID/Audio OTP token is designed for the vision-impaired and pronounces codes aloud, illustrating the conflicting needs-for example, security and accessibility-that security professionals must regularly balance in the real world. SafeID/Classic SafeID/Mini SafeID/Anytime SafeID/Pinpad SafeID/Audio SafeID/Eco ![]() ![]() They offer a variety of authenticators to fill these roles: Here's what we found.ĭeepnet actively positions its products as premier solutions for Microsoft Azure MFA and Office 365, as well as for FIDO/FIDO2 applications. We recently took a look at seven of the most popular authenticator families to see just what features they offer and how their back-of-box claims compare. These offer the same credential support as touch or plug-in OTP+PKI authenticators, but supply codes or credentials wirelessly, using either near-field communication (NFC) or low energy Bluetooth (BLE). That opens the door to far longer OTP codes along with the management and use of public key infrastructure (PKI) and other extended credentials. Rather than displaying codes, these authenticators type them for you, via USB. In most cases, the user must manually enter this code at the login prompt. These tokens display a short, rotating one-time password (OTP) on a small screen. Still, look deeper and it becomes clear that there are just three major kinds of tokens on the market: ![]() Yet the hardware token landscape can seem confusing-particularly given its mix-and-match nature in terms of features and form factors. ![]() At their best, hardware tokens offer an alternative to the particular security, convenience, privacy, and cost issues that accompany phone-based multi-factor authentication.
0 Comments
Leave a Reply. |