Raz-Lee Security Inc announces a major software upgrade for iSecurity MFA, a solution that provides comprehensive Multi-Factor Authentication at sign-on and when services such as FTP, ODBC, and the use of IFS shares are initiated.
Raz-Lee introduces their enhanced MFA feature, which now includes a direct connection with external MFA providers such as DUO, OKTA, and PINGID, eliminating the need for an intermediary computer.
Receiving a notification alert directly to your smartphone you can approve or deny the access to the IBM i.
Raz-Lee's MFA solution is compatible with virtually any other MFA software, offering seamless integration and access to DUO, OKTA, and other providers.
Additionally, iSecurity MFA supports Oauth2 and provides full support for RADIUS-compatible products, ensuring comprehensive security for your authentication needs.
This comes as an addition to the product’s existing additional factors, including One Time Passwords (OTP), Time Based OTP (TOTP) and private questions. External authenticators are based on well-known standards. The ability of iSecurity MFA to use these standards opens up the possibility to communicate with other products used by organisations. For example:
© Bidfood Als één van de grootste leveranciers voor de horeca draait Bidfood 24/7: van eigen leveringen, order picking en...
De klassieke manier van een netwerk beveiligen wordt ook wel het ‘eggshell computing’-model genoemd. In dit geval...
In onze vorige artikelen over NIS2 en DORA bespraken we de belangrijkste veranderingen en verplichtingen die de nieuwe...
Waar voorheen het analyseren en kennis nemen van de risico`s voldoende was, zal de Digital Operational Resilience Act...
European law dictates that companies, financial corporations and government agencies are required to secure their sensitive personal...
NIS2 verschuift de focus van individuele bedrijven naar supply chains en de maatschappij. En dat zou jij ook moeten doen....
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data...
The answer to “how much security is enough?” all depends on the data that the organization possesses. And then what must be...