Protectimus EVV system allows the homecare service providers to determine the exact time and duration of visits of their employees to the clients with the help of OTP codes from hardware TOTP tokens


Two-factor authentication

Five tips on how to choose the best multifactor authentication among dozens of MFA solutions on the market


Multi-factor authentication

Don’t reinvent the wheel, use cloud-based two step authentication, add several authentication methods, use adaptive authentication, and encourage users to activate 2FA


Adaptive Authentication or How to Make 2FA Convenient for Users

Adaptive authentication means analyzing behavioral factors typical for the user and asking for a one-time password only if a large number of mismatches is detected



Setting multifactor authentication up can be a daunting task, and we’re here to cover all you’d ever need to know about it.


VPN two-factor authentication adds another layer of security to the primary method of authentication (password), Protectimus 2FA solution can be connected to any VPN service with the help of the RADIUS protocol using the Protectimus RProxy component


Tools you need for remote work, IT security threats you should be aware of when working remotely, and cybersecurity tips for remote working


keylogger — what is it

sms authentication

Protectimus

Two-factor authentication solutions for business. Secure your organization’s and user’s data with MFA: https://www.protectimus.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store