Authentication Services

 

#imetrixexpert

Keep Criminals Outside Your Network with AuthPoint

Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-factor authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications. Even non-technical users find the AuthPoint mobile app easy and convenient to use!

  Work with it

Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks.

 
 

Effective MFA Protection with Mobile Device DNA

AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity; and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked – since the device DNA would differ.

Easy-to-Use AuthPoint Mobile App

WatchGuard’s AuthPoint app allows users to authenticate right from their own phone! No need to carry key fobs or thumb drives; instead install and activate the AuthPoint app in seconds, and then use it to authenticate from a smartphone. It enables speedy push-based authentication as well as offline authentication using QR codes with the phone’s camera.

Strong Ecosystem

WatchGuard’s ecosystem includes dozens of 3rd party integrations with AuthPoint – allowing companies to require users to authenticate before accessing sensitive Cloud applications, VPNs and networks. AuthPoint supports the SAML standard, permitting users to log in once to access a full range of applications and services.

Fast VPN and Remote Access Deployment

Any remote access or VPN application should have MFA to protect the network from unauthorized entree. And with today’s demand for VPN and remote user access it becomes even more essential. If you have WatchGuard Fireboxes, configuring a VPN with AuthPoint is remarkably simple and done in minutes. The result? Firewalls empowered with risk-based authentication.

Management on the WatchGuard Cloud Platform

Companies with limited IT staff and security expertise benefit from MFA protection that’s easy to deploy and manage in WatchGuard Cloud. There is no need to install software, schedule upgrades or manage patches. You can configure a single global account view or many independent accounts. Plus, the Dark Web Scan feature is available to search email addresses and company domains to see if accounts have been exposed on the dark web during known data breaches.

Hardware Token Authentication

AuthPoint’s time-based, one-time password (OTP) hardware token is a sealed electronic device designed to generate secure OTPs every 30 seconds that businesses can use as an alternative to the mobile token to authenticate into protected resources. Our hardware tokens are ready to use and can provide an additional source of protection for businesses when mobile device use is limited or restricted.

Downloads & Resources

Solution Brochure: MFA That’s Powerfully Easy

White Paper: AuthPoint

Try AuthPoint Now!

Get a Free Personalized Dark Web Report

WatchGuard AuthPoint comes in handy as a very powerful and useful tool whenever you want to add this extra security as Multiple Factor Authentication for users in an effective way.
Daniel Lopez Senior Engineering Manager
Read full review
I would put AuthPoint at the top of the chart for multi factor authentication products.
Authenticated Reviewer Technician
Read full review
Our organisation is confident our users are protected by WatchGuard AuthPoint.
Authenticated Reviewer Engineer
Read full review
We also found AuthPoint to be much quicker on the push and response process, as well as having the offline QR code challenge/response provides a stronger security solution for offline access requirements.
Authenticated Reviewer Professional
Read full review
Previous slide
Next slide

What are you waiting for?

For any additional questions, contact one of our
Sales Agents or give it a trial spin.