Elevate your security posture in accessing applications
Use Cases and Deployment Scope
Today we have several applications that are accessed on the internet, which we cannot accept that a simple exposure of a user password allows undue access to one or more of these applications. So to raise the level of protection to access performed by users, we use VIP as a two-factor authentication solution.
Pros
- Push authentication request.
- Credential wallet.
- Cloning protection.
Cons
- The API is no easy to use.
- The push functionality not always is quickly to alert in mobile.
- The migration feature is so hard to execute.
Most Important Features
- Credential Wallet.
- Cloning Protection.
- Push request authentication.
Return on Investment
- Elevation of the security posture of 100% of corporate users in the authentication process.
- Resistance from some users with the greatest complexity in the access process.
- 100% confidence that the access was actually performed by the authorized person.
Alternatives Considered
Cisco Secure Access by Duo
Other Software Used
Palo Alto Networks Next-Generation Firewalls - PA Series, VMware ESXi, Netskope NextGen SWG
