• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg

Secure VPN Authentication

VPN is able to provide enterprises with secure connection for network access at affordable costs. However, the network administrator has difficulty in the security management by keeping his network safe from unauthorized persons entering his network since the basic authentication is rather weak.

There are four different strong authentication solutions ID Control offers for enhanching the weak VPN Authentication: ID Control USB Token, OTP Key, CardID, HandyID, MessageID and KeystrokeID. ID Control strong authentication solutions integrate easily with the major VPN vendors, such as with Juniper, Cisco, Citrix, Astaro, Paolo Alto Networks, Securepoint, Fortinet, Sonicwall and Checkpoint.

ID Control USB Token
With the passwords and other user credentials saved in the ID Control USB Token, all the administrator has to do is only hand out the ID Control USB Tokens with Secure VPN Authentication to the users. The management of those keys and users will substantially reduce the users' involvement and hassle. Users can carry out the whole process with great ease and minimum impact and interference. The ID Control Server can effectively and efficiently help the system manager to manage and distribute the ID Control USB Token and the security software module named Secure VPN Authentication. As the parameters that have to be used for authenticating to the VPN connection are previously and securely stored in the ID Control USB Token by the administrator, the client can proceed the dialup connection once the ID Control USB Token is plugged in. ID Control USB Token with Secure VPN Authentication effectually strengthens the security of using the VPN for secure network access and provides a minimum of user interference. The ID Control USB Token can be used next to Secure VPN Authentication for Single Sign On (SSO) for secure web applications, extranet access, network logon, windows remote desktop, secure computer access, PKI, file, flash memory and disk encryption, email encryption and signing and as a password manager for remembering and automatically filling out your passwords for different applications.

OTP Key
The ID Control OTP Key is easy for users to strongly authenticate to VPN at anytime and anywhere, with just a press on the button on the token the one-time numeric passcode appears on the screen which can be entered into the logon field of the VPN connection.
Also available in credit card size format!

HandyID and MessageID
However the administrator can also choose for turning a mobile phone into an authentication token by distributing the HandyID and/or MessageID (SMS based) authentication token as a mobile application to the user’s mobile device. When the user enters the correct PIN for HandyID on his or her mobile device the user can log in with an One Time Password to the VPN of the organization. HandyID is a mobile One Time Password authentication solution based on time, counter or challenge response security mechanisms. HandyID can next to Secure VPN Authentication be used for Single Sign On (SSO) for secure web applications, extranet access, network logon and outlook web access sign-on.

KeystrokeID
Organizations with a demand or need for Citrix VPN authentication with a minimum of user interference can also implement KeystrokeID which analyzes the user’s keystroke behaviour before granting users access to VPN. KeystrokeID uses the biometrics behaviour of how users type with their own unique way on their keyboards. KeystrokeID can be used next to Secure VPN Authentication for Single Sign On (SSO) for secure web applications, extranet access, network logon and outlook web access sign-on. KeystrokeID can be used in addition to HandyID and the ID Control USB Token.

SecureVPN with ID Control USB Token, OTP Key, CardID, HandyID, MessageID and/or KeystrokeID for authentication, while using his existing network policy for managing the authorization part or a third party solution, reduces the risk and threat of potential identity theft and fraud. But the relevant connection ingredients, the password and other user credentials and permissions are not required to be published to the users. This will significantly reduce the technical support and the maintenance work and costs during the release and management process.