Two-Factor Authentication

Keep all your devices safe from hackers with Petronella Technology Group’s (PTG) Two-Factor Authentication services.

We understand you might have questions about this service; don’t hesitate to schedule a meeting with Craig to answer any questions you might have about this or any other service/product PTG offers.

The complete Authentication solution for all your needs

Sign Up & Get Protected

Versatile

Multiple authentication methods – Out-of-Band , Push, Hard/Mobile/Desktop tokens and Biometrics.

Well-connected

Multiple interfaces – RADIUS, Citrix, Web, ADFS.

Easy to Use

Easy to provision and use. Multi-tier administration and audit logs for compliance.

Flex. Deployment

Only solution that can be deployed on-premises, in the cloud or a combination of the two.

Two Factor Authentication secures access to

  • VPN – IPSec or SSL VPNs
  • Citrix networks
  • Web applications – On-premises or Cloud
  • OWA, Sharepoint, Office365 and Others
  • Windows desktop login
  • Transactions – via out-of-band verification

LET US HELP PROTECT YOUR BUSINESS DATA

Easy to provision

Two Factor Authentication has multiple provisioning methods including:

  • Self Service Portal
  • Active Directory Synchronization
  • Web Manager
  • HTTP Provisioning Interface
  • Mobile “One Touch” provisioning

Sign Up & Get Protected

Two Factor Authentication secures access to

  • VPN – IPSec or SSL VPN
  • Citrix networks
  • Web applications – On-premises or Cloud
  • OWA, Sharepoint, Office 365 and Others
  • Windows desktop login
  • Transactions – via out-of-band verification

Sign Up & Get Protected

Authentication Methods

Two Factor Authentication has a number of authentication methods. These include:

  • Out-of-Band Phone – #, PIN, OTP or Voice biometrics
  • OTP Delivery to Phone via SMS, Voice, Email or Push
  • Out-of-Band Push – Accept/Deny, PIN or Fingerprint
  • Hard Tokens – Key fob, USB key or Wallet card
  • Mobile Tokens – iOS, Android and Blackberry
  • Desktop Tokens – Windows, Mac or Linux
  • Support for FIDO – coming soon

Sign Up & Get Protected

Flexible Deployment

Two Factor Authentication has multiple deployment options:

  • On-Premises
  • Cloud
  • Hybrid – On-Premises + Cloud
  • OEM – Become a cloud authentication provider
  • Flexible pricing model

Sign Up & Get Protected

Schedule an Appointment

Schedule an Appointment

    SCHEDULE AN APPOINTMENT

    Make It Happen Now

    CLIENT SUPPORT

    Don't Feel Stranded

    CONSULTATION

    Get Best Advice

    PAYMENTS

    Get Paid

    Top