4
Advanced Authentication & Password Management For Public Safety

2FA Advanced Authentication for Public Safety

  • Upload
    2fa-inc

  • View
    163

  • Download
    5

Embed Size (px)

Citation preview

Page 1: 2FA  Advanced Authentication for Public Safety

Advanced Authentication &Password Management For Public Safety

Page 2: 2FA  Advanced Authentication for Public Safety

Three steps to deploying CJIS compliant advanced authentication:

Authentication Methods Supported by 2FA ONE

1. Select the authentication technology that works best for your organization

2. Install and deploy 2FA ONE

3. Enroll users

Need a low-cost option? Risk-based authentication is a popular tokenless choice. Want to leverage existing hardware investments? Consider using the embedded fingerprint or card readers in laptops. Leverage an existing magnetic swipe reader connected to your mobile units. Looking for an easy-to-use solution for the officers? Maybe opt for using an existing I.D. badge

used for building access. Concerned about having the highest level of security? Implementing digital certificates with contact smart cards or tokens can be a great solution. With deep experience in all kinds of authentication, 2FA will help you select the best fit for your agency today and keep you future-proofed as the CJIS Security Policy evolves.

• RFID Cards, Fobs, Tags, and enabled phones

• Smart Cards and USB Tokens with PKI

• Biometrics (fingerprint)

• Magnetic Stripe (Agency Issued ID Card or Driver’s License)

• Risk-based Authentication (tokenless)

• One-time password cards or tokens

With no additional appliances or servers to purchase, customers routinely download 2FA ONE and are installed, configured, and running in a matter of minutes. Automated processes tie in to existing infrastructure like Active Directory and mobile VPNs, minimizing the effort required to get started. Authentication method selection, desired policies, and system preferences

are straightforward settings in an easy-to-navigate web interface. Client installation can be pushed out with standard desktop publishing tools. In the event your agency has specific environmental requirements, our engineers are ready to walk you through the process to make sure the experience is a smooth one.

Enroll once. Authenticate anywhere. The user enrolls in the system one-time, on one machine, and then can roam to any machine, including mobile units. Cases

such as forgotten cards or forgotten PINs are handled automatically through easy to understand self-service processes.

Page 3: 2FA  Advanced Authentication for Public Safety

No modules, no add-ons. ONE complete authentication solution for today, tomorrow, and future requirements.

• ADVANCED AUTHENTICATION• PASSWORD MANAGEMENT• SINGLE SIGN-ON TO PUBLIC SAFETY APPLICATIONS• SELF-SERVICE PASSWORD RESET• COMPLIANCE REPORTING• SMOOTH ROAMING BETWEEN SYSTEMS • ENABLES ENCRYPTION AND DIGITAL SIGNATURES• AUTO DESKTOP LOCKING• FUNCTIONALITY ON WINDOWS XP & WINDOWS 7• SUPPORT FOR DOMAIN AND LOCAL LOGON

Verified by Veracode®

The technology in 2FA ONE is the only strong authentication

solution to continuously undergo rigorous third-party

validation by Veracode.

SC Magazine® 5-Star Award

Awards and accolades for 2FA designs and

technology from industry leading analysts and

trade journals such as SC Magazine.

Info Security named 2FA ONE 2013’s

“Best Authentication Product”

and

“Best Security Product for Government”

Features of 2FA ONE

Concerned about keeping up with future CJIS security requirements? 2FA is the only solution that protects you from a rip-and-replace scenario.

See 2FA ONE in action

Addison Police: An Overview

Addison Police: An In-Depth Look

Page 4: 2FA  Advanced Authentication for Public Safety

2FA Inc. is an Austin, Texas based, veteran-owned, software company created on the single vision of simplifying advanced authentication. Since 2006, 2FA has been at the forefront of technological advances in security and authentication, with many industry “firsts”.

To best serve agencies, 2FA has prioritized interoperability with other systems commonly found in the public safety environments. 2FA ONE works seamlessly out-of-the-box with solutions such as ICS, Intergraph, Motorola, NetMotion, New World Systems, Southern Software, Spillman, SunGard, Tiburon, TriTech, CryWolf, and many more.

Today, as 2FA continues to grow and develop advanced authentication software, the professional services team assists our clients with services designed to complement the 2FA ONE capabilities in public safety. 2FA’s unique position as a software development company with deep experience and expertise in strong authentication makes 2FA a perfect choice to satisfy a broad range of advanced authentication requirements.

About Us

10713 North FM 620Suite 201

Austin, TX 78726512.918.3200 phone 512.918.3206 fax

[email protected]

ONE for Advanced AuthenticationONE for Password ManagementONE for Single Sign-OnONE for Compliance ReportingONE for your Future Requirements

SOFTWARE SALESHARDWARE SALESSECURITY CONSULTINGSYSTEMS INTEGRATIONSOFTWARE DEVELOPMENTMAINTENANCE & SUPPORTTRAINING

What We Do