Improved security
The data security of our solutions and therefore your data is our top priority. With a second factor, you secure the login to our software so that even if you know the password, no login is possible without the second factor.
Various options.
TAN by e-mail.
A TAN is sent as a second factor parallel to the normal login via username and password to an e-mail address provided by the user.
Hardware token.
A hardware token, e.g. on the key ring or at the workplace, displays the valid TAN required for login on a time-based basis.
Authenticator Apps.
A smartphone app, e.g. Google or Microsoft Authenticator, displays the valid token based on time, similar to the hardware token.
IP addresses.
If, for example, a fixed IP address or a whole range of IP addresses is known throughout the company, this can be used as a second factor.
A password alone is no longer enough to protect your data!