Two factor authentication is useful beyond simple login applications for remote access services. We offer our knowledge to extend your capabilities to successfully implement 2FA.
A number of specialized use cases are ideal for using air gapped, counter based OTP tokens:
- Protection of sensitive data records like VIP data in customer care systems
- Key Management System use cases
- High assurance / high availability systems that rely on cloned cards (cards with the same secret key)
- Quorum decisions when handling change or deletion of critical data records
- Pseudonymous voting systems like closed user group voting tied to memberships
Benefit from our comprehensive experience in designing and implementing large-scale enterprise and public-facing applications with strict security requirements (PCIDSS, ISO27001).