Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

ManageEngine ADSelfService Plus Adds MFA for VPNs to Protect Remote Workforce

Provides a Higher Degree of Security by Adding an Extra Authentication Step

  • Supports a wide range of authentication methods including fingerprints, Face ID, push notifications and Google Authenticator
  • Integrates seamlessly with Active Directory to facilitate easy implementation of MFA

ManageEngine, the IT management division of Zoho Corporation, announced that ADSelfService Plus, an integrated Active Directory (AD) self-service password management and single sign-on (SSO) solution, now supports multi-factor authentication (MFA) for VPNs to protect organizations’ internal networks from unauthorized access. By adding an extra authentication step, ADSelfService Plus makes it extremely difficult for attackers who depend on password cracking or compromised credentials to gain access to the network resources.

Recommended AI News: Bidalgo Transforms Ad Creative Production and Analysis With the Launch of Creative Center

Amid the COVID-19 outbreak, enterprise VPN solutions have become indispensable for organizations with employees who work from their homes and yet need to access resources on their organizations’ internal networks to get their work done. As a result, VPNs have become the focus of hackers such as the one who reportedly published a list of plaintext usernames and passwords, along with IP addresses for more than 900 Pulse Secure VPN enterprise servers. To prevent attackers from using compromised credentials to access VPN servers, the US Department of Homeland Security recommends implementing MFA on all VPN connections to increase security.

“VPN gateways are directly accessible through the internet and are prone to brute force and other types of attacks. Relying on credentials alone to protect VPN access to vital resources could result in immeasurable losses,” said Parthiban Paramasivam, director of product management, ADSelfService Plus. “Implementing MFA for VPNs ensures that employees have a second layer of defense even if their credentials are compromised. ADSelfService Plus presents a MFA solution that is both secure and easy to use for employees.”

Related Posts
1 of 40,645

Recommended AI News: Intel Promotes Chief Diversity and Inclusion Officer Barbara Whye

Securing VPNs with MFA via biometric authentication and security tokens

The 2020 State of Password and Authentication Security Behaviors Report found that biometric-based authentication was the top preference among users when it comes to authentication. ADSelfService Plus supports a wide range of secure and user-friendly authentication factors, including:

  • Fingerprints
  • Face ID
  • Push notifications and TOTPs via the ADSelfService Plus mobile app
  • YubiKey OTP
  • Google Authenticator
  • Microsoft Authenticator

Additionally, ADSelfService Plus seamlessly integrates with Active Directory (AD). Since many organizations already use AD credentials for VPN authentication, implementing MFA for employees requires only minimal configuration.

Apart from MFA, ADSelfService Plus also supports creating strong password policy rules that prevent dictionary words, palindromes and common patterns such as 1234, asdf and qwerty. Similarly, ADSelfService Plus integrates with Have I Been Pwned? to prevent users from setting their account passwords to previously compromised passwords.

Recommended AI News: Okta Deepens Japanese Operations, Welcomes First Country Manager

Comments are closed, but trackbacks and pingbacks are open.