{"id":42,"date":"2018-10-01T21:23:43","date_gmt":"2018-10-01T19:23:43","guid":{"rendered":"http:\/\/2-faktor-authentifizierung.de\/?page_id=42"},"modified":"2021-11-30T12:19:18","modified_gmt":"2021-11-30T11:19:18","slug":"startpage","status":"publish","type":"page","link":"https:\/\/2-faktor-authentifizierung.de\/en\/","title":{"rendered":"Startpage"},"content":{"rendered":"
[vc_row][vc_column width=”2\/3″][vc_row_inner][vc_column_inner][vc_single_image image=”239″ img_size=”full”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”2\/3″][vc_column_text]<\/p>\n
\u00b7 Two-factor authentication
\n\u00b7 Login at the operating system
\n\u00b7 Intuitive and easy to understand
\n\u00b7 Complex passwords without mistyping
\n\u00b7 Session monitoring
\n\u00b7 Multi-user ability
\n\u00b7 No PKI necessary[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/3″][vc_single_image image=”974″ onclick=”custom_link” link=”https:\/\/www.teletrust.de\/en\/itsmig\/”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n
\u00b7 Application impersonation
\n\u00b7 Can be integrated with a lot of access control\/canteen\/time-recording systems[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n
Up until now, smartphones were already used as password display units for a two-factor authentication. During the RSA 2018 in San Francisco, digitronic\u00ae showed where this process could be headed in the future. In the solution we presented at this conference, the smartphone was used as a self-sufficient, full-featured token. Innovation pays off: Secure Logon™ 2.0 was nominated for the Saxony State Price for Innovation. Secure Logon™ 2.0 was part of the \u201eBest of IT-Security\u201d in 2017. This is proof that our login solution is also well received among experts in the field. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=”600″ img_size=”medium” alignment=”center” onclick=”custom_link” link=”\/en\/awards\/”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=”602″ img_size=”large” alignment=”center” onclick=”custom_link” link=”\/en\/awards\/”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text] [vc_row][vc_column width=”2\/3″][vc_row_inner][vc_column_inner][vc_single_image image=”239″ img_size=”full”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”2\/3″][vc_column_text] Basic functions of Secure Logon™ 2.0 \u00b7 Two-factor authentication \u00b7 Login at the operating system \u00b7 Intuitive and easy to understand \u00b7 Complex passwords without mistyping \u00b7 Session monitoring \u00b7 Multi-user ability \u00b7 No PKI necessary[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/3″][vc_single_image image=”974″ onclick=”custom_link” link=”https:\/\/www.teletrust.de\/en\/itsmig\/”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text] Features of Secure Logon™ 2.0 \u00b7 Application impersonation \u00b7 Can … Continue reading “Startpage”<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"yoast_head":"\n
\nYou can read the full press release here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\nSecure Logon™ 2.0 nominated for the Saxony State Price for Innovation 2017<\/h2>\n
\nWithin the framework of the awards ceremony, guests were able to take a look at this remarkable solution.
\nYou can read the full press release here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\nInnovation Award IT 2017<\/h2>\n
\nYou can read the full press release here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=”1\/3″][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\nAwards:<\/h4>\n
Credentials:<\/h4>\n
HQM Induserv GmbH<\/strong>
\nHQM Induserv GmbH is a subsidiary of the HQM Group. (\u2026) We were looking for security solutions for 2-factor authentication and encryption. \u2026\u201d …more<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=”670″ img_size=”medium” alignment=”center”][vc_column_text]Minda KTSN Plastic Solutions GmbH & Co. KG<\/strong>
\nData protection as a competitive advantage: Aside from data encryption, Minda KTSN Plastic Solutions GmbH & Co. KG uses this advantage in the form of two-factor authentication.\u00a0…more<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text]Konstruktionsb\u00fcro Cramer & Co. GmbH<\/strong>
\n\u201cWith the easy integrable 2-factor authentication is our confidential construction data at 15 workstations ideal protected on seven days a week and 24 hours a day.\u201d …more<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"