Privileged Access Management

VISULOX Multi Factor Authentication

Securing access to IT and OT systems by enforcing multi-factor authentication

Versatile and flexible. Optimised for all applications.

Requiring a second factor when registering a privileged user is now considered a matter of course.elcome as a matter of course. Especially for remote maintenance access, two-factor authentication is becoming the standard.

VISULOX Multi Factor Authentication offers a customised solution that realises the optimal use of a second registration factor.

VISULOX Multi Factor Authentication Key Feautures

Who did what, when, where and how?
Answer it.

Customised login solution

Demand-oriented provision

Integration of existing solutions

Cost reduction through centralization

Customised login solution

VISULOX Multi Factor Authentication offers flexible possibilities to use the second factor effectively and purposefully depending on the respective process: Whether with physical PIN generators, smart cards, biometric features or OTP systems on smartphones. After all, not every type of two-factor authentication is optimally suited for every case.

Demand-oriented provision

When requesting the second factor, VISULOX Multi Factor Authentication offers flexible options by default:

  • TicketID / Service Session ID
  • Verbal, through integration of a HelpDesk
  • Google Authenticator, LastPass, Microsoft Authenticator
  • SMS / e-mail
  • Biometric identifiers
  • Physical tokens

It is also possible to activate VISULOX Multi Factor Authentication exclusively for external users.

Integration of existing solutions

Often, processes are already defined within IT operations and individual solutions for two factor authentication are in use. However, these are often the integrated functions of individual applications. This results in heterogeneous isolated solutions, which in turn have a high administrative overhead due to decentralization.

VISULOX Multi Factor Authentication relies on the fact that there can be multiple solutions for two-step authentication, but they are all managed and controlled centralized .

Cost reduction through centralization

The use of application-internal two-factor authentication or the global use of general physical tokens offers easy integration at first glance as well as independence from online services, but on the other hand requires a high administrative effort. This is directly linked to corresponding costs, which are unwillingly borne, especially if there are many different but rarely active users.

Privileged Access Manager Module

Session Recorder

Record all or individual user interactions, unavoidably or on request as an indexed film.

Cockpit

Manage all access rules and monitor current status and user activity at a glance.

Cooperation

Flexible, documented and secure desktop sharing without compromising separate security zones.

Revision Server

Automated and unavoidable backup of all audit-relevant data and information.

Host Control

Restrict access from specific locations, time slots, accounts or other definable preferences.

Multi Factor Authentication

Securing access to IT and OT systems by enforcing multi-factor authentication

Cookie Consent with Real Cookie Banner