deen
Menü öffnen

2-factor authentication

We secure access to your and our own solutions with various 2-factor authentication methods, ensuring that only you have access to your sensitive data.

Improved security

The data security of our solutions and therefore your data is our top priority. With a second factor, you secure the login to our software so that even if you know the password, no login is possible without the second factor.

Various options.

We offer various options for using 2-factor authentication. Depending on the intended use and user base, you can choose from various options.

TAN by e-mail.

A TAN is sent as a second factor parallel to the normal login via username and password to an e-mail address provided by the user.

Hardware token.

A hardware token, e.g. on the key ring or at the workplace, displays the valid TAN required for login on a time-based basis.

Authenticator Apps.

A smartphone app, e.g. Google or Microsoft Authenticator, displays the valid token based on time, similar to the hardware token.

IP addresses.

If, for example, a fixed IP address or a whole range of IP addresses is known throughout the company, this can be used as a second factor.

Please contact us with a non-binding inquiry or check out for yourself “why cortex”.

A password alone is no longer enough to protect your data!

Secure login

The problem without the second factor can be described relatively simply: If the user name – for which the e-mail address is often used – and password are known, it is possible to log in from anywhere on the planet. This means that the risk of unauthorized access is enormous.

In addition, many people do not protect their passwords sufficiently by choosing simple passwords or using the same one over and over again. Ransomware has also made the risk of compromised passwords extremely high.

A secure solution to this problem can only be provided by authentication with a second factor. Even if the password is known to an attacker, he cannot log in without the second factor and therefore has no access to your data. In this way, we create a level of security that has long been standard in online banking, for example.