Enabling Virtual Private Network (VPN) Authentication
VPN Security and Secure Remote Access: Strong Authentication for VPN
Organizations find it essential to balance the security of their networks with the need to enable employees to remotely access those same networks.
To provide access, many companies use Virtual Private Network (VPN) hardware, which creates an encrypted "tunnel" through the Internet. While this protects information in transit, it does not necessarily ensure that only authorized users can access the network itself. So, while information is secure while it is in transit, it could be going to the wrong people.
To ensure that only authorized VPN users access protected networks, Authenex® produces the Authenex® Strong Authentication System (ASAS®). The ASAS® System stands guard and requires anyone to verify who they are via two factor authentication before remotely accessing a network.
Like a bank ATM, the ASAS® System two-factor authentication process is based on identifying a user by something they have (in this case, an A-Key® token) and something they know (a password or PIN). VPN users accessing your network must use both factors to gain access. Without both, the ASAS® System denies access.
Using One-Time Password (OTP) access, the VPN user's A-Key® token generates a six-digit OTP value. The user enters that number along with their PIN into the VPN log in password field. Each OTP value is unique and can only be used once. Every time the user accesses an ASAS® System-protected VPN log in, a new, unique OTP value is required.
Designed to integrate with existing infrastructure, the ASAS® System is easy to install and manage. Using a Web browser, even low-tech people can perform most administrative tasks. And the User Self Service Center module enables end users to perform routine A-Key® token management and deployment tasks.
Finally, the ASAS® System works with all of the top VPN providers, including Check Point, Juniper Networks/Netscreen and Cisco Systems. And it scales to handle the two-factor authentication needs of small and medium sized businesses as well as enterprises with thousands of users.