{"id":46,"date":"2018-10-01T21:27:31","date_gmt":"2018-10-01T19:27:31","guid":{"rendered":"http:\/\/2-faktor-authentifizierung.de\/?page_id=46"},"modified":"2022-08-22T10:43:53","modified_gmt":"2022-08-22T08:43:53","slug":"features","status":"publish","type":"page","link":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/","title":{"rendered":"Features"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text]<\/p>\n

Service features of Secure Logon™ 2.0<\/h1>\n

[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Due to increasingly better methods of exposing user names and passwords, a classic logon that relies exclusively on the security factor password is no longer secure. However, mistyping continually changing and complex passwords also means an increase in support effort. Secure Logon™ 2.0 solves these problems in an uncomplicated way and guarantees a secure and comfortable login that can be implemented with minimum effort.
\nSecure Logon™ 2.0 provides a two-factor authentication which uses the user login with a token as the first factor and a PIN as the second factor.
\nAs a result, it does not matter if you merely want to login locally, at a Windows domain or even with your Microsoft account. Furthermore, Secure Logon™ 2.0 offers integrated session monitoring so that access to your PC is blocked as soon as the token is no longer connected to the PC. This login solution is available for all Windows operating systems starting from Windows 7.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Easy and intuitive use!<\/h2>\n

Plug in the reader, insert the card and nothing works? This will not be the case with Secure Logon™ 2.0. The tidy and modern user interface is quick and easy for users to access. The admin does not need to install and maintain any server components or PKIs. The client solution can be set up during the login into Windows and then directly monitors the logged on session.<\/p>\n

Try out Secure Logon™ 2.0 in the download<\/a> section and get a free 30-day-trial.[\/vc_column_text][\/vc_column][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Save time and money with Secure Logon™ 2.0!<\/h2>\n

It takes a lot of time to put in complex passwords and you always run the risk of mistyping several times during the process. If an account is blocked due to too many failed login attempts, it means additional work for the admin. Thus, both employees as well as admins are prevented from doing their actual work.<\/p>\n

Secure Logon™ 2.0 reduces these interruptions while also increasing security and providing a more comfortable way of logging in with just a token and PIN.<\/p>\n

Take a look at our prices<\/a> and get an individual consultation.[\/vc_column_text][\/vc_column][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Invest in your security!<\/h2>\n

Are you aware of the danger of weak authentication? You want a secure, but also uncomplicated and quickly implementable solution?<\/p>\n

Invest just a little bit of your time in a personal consultation regarding Secure Logon™ 2.0 to achieve a fast increase in your security and meet data protection regulations.<\/p>\n

A reliable means of security can be achieved faster and in a simpler way than what you might have thought.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”229″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Secure Logon™ 2.0 secures your login data<\/h2>\n

Secure Logon™ 2.0 secures your login with the help of two-factor authentication and powerful cryptography. Logging into your PC will then require two things: a token and a PIN. Even if you lose your token or if it gets stolen, it cannot be used without the PIN. Likewise, a potential aggressor cannot do anything with your PIN without the token, as they cannot login without it. There are different tokens that are supported and you can get more information here<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”266″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Secure Logon™ 2.0 monitors your user session<\/h2>\n

With the help of Secure Logon™ 2.0, you will meet all data protection regulations. If an employee leaves their workplace and takes the token with them, the computer will be locked automatically. This way, a random guest will not be able to see the data the employee was working on. In contrast to a lock screen that comes into effect after a certain period of inactivity, the blocking provided by Secure Logon™ 2.0 cannot be prevented by \u201cshaking the mouse\u201d. However, there is the possibility to initiate the lock only after a set timer runs out, so an unintentionally disconnected token can be connected again without the need to login once more.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”237″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Work with Remote Desktop<\/h2>\n

Secure Logon™ 2.0 allows you to connect with computers with your login data via Remote Desktop. This also makes it easy to change computers and access terminal servers. Depending on your settings, either only the remote session or all the sessions that you are logged into will be locked.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”233″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Multi-user- \/ multi-account capacity<\/h2>\n

You have to authenticate yourself with different accounts and different permissions? That is not a problem with Secure Logon™ 2.0. Depending on the token type, you can link up to 20 different accounts. Thus, you will not need several tokens or readers if a task has to be started as an admin, as long as an admin account was linked to the token.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”223″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Cloud-ready with Microsoft accounts<\/h2>\n

Apart from Active Directory and local access data, new technology enables the linking of login data of Microsoft accounts that give you direct access to Microsoft\u2019s cloud services. This way, different types of accounts can be linked with a token with the help of Secure Logon™ 2.0.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”225″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

One key – several applications<\/h2>\n

Do you already use a chip-based time recording system, an electronic access control, an alarm system or employee cards for the cafeteria? With Secure Logon™ 2.0, you often do not need to get new chips, cards or tokens, as existing devices can be used and integrated.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”221″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Save time with Secure Logon™ 2.0<\/h2>\n

Thanks to the two-factor authentication, account lockdowns within the domain and employees having to call the IT admin after their vacation are a thing of the past. Due to the division into a token and a PIN, the latter does not need to be as complex as a password. Thus, employees will remember their PINS more easily. Furthermore, due to the nature of Secure Logon™ 2.0, it is no longer possible to put in a password incorrectly.
\nSecure Logon™ 2.0 is a client solution and thus will need next to no changes in your domain, which saves time during the familiarisation, set-up and installation.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”235″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Multi-token capacity<\/h2>\n

Secure Logon™ 2.0 also allows one user to use multiple tokens. This is especially helpful if you have to be logged in at different workstations, for example to keep an eye on monitoring while going about your day-to-day operations. However, keep in mind that the workplaces will only be locked if the respective tokens are removed.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”241″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Application impersonation<\/h2>\n

With Secure Logon™ 2.0, it is possible to start programs in the context of another user when anonymously logging on to the operating system, provided that this user has also been linked to the token. This could come in handy if certain programs are supposed to be executed as a local admin at system startup or if you work locally but an intranet personalised with the domain account has to be started.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”231″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Interaction with Secure Logon™ 2.0<\/h2>\n

Apart from the most important feature – keeping your clients save from unauthorised access – Secure Logon™ 2.0 also has a simple and intuitive user interface. The necessary steps to protect your clients\u2019 security have been limited to the essentials and are presented in a comprehensible manner.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”227″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

First solution with Credential Provider v2<\/h2>\n

Secure Logon™ 2.0 was and continues to be the first visionary solution that used the Credential Provider v2 interface for the integration into Windows operating systems. Count on a leading innovation in the filed of login solutions.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”219″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Installation & rollout strategies in companies<\/h2>\n

Secure Logon™ 2.0 is limited to the essential functions of a two-factor authentication. The software is client-based and is installed on Computers that you want to secure. There are no server components, no need for a complex IT infrastructure, and directory services are not a prerequisite for the use of Secure Logon™ 2.0.
\nRollout strategies are supported for a fast and efficient integration of Secure Logon™ 2.0 into the daily work routine of a company. The software is automatically installed on the client computers provided for this purpose. Additionally, Secure Logon™ 2.0 can also be managed centrally via an existing directory service.
\nFor more detailed information about the automatic distribution of Secure Logon™ 2.0 and the central configuration, please contact us via
support@digitronic.net<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”261″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Part of the digitronic\u00ae All-In-One security packages<\/h2>\n

Secure Logon™ 2.0 is a part of our All-In-One security packages. Together with HiCrypt™ 2.0, our award-winning encryption of data on network drives, these packages increase the confidentiality of your sensitive data and thus your information security. This way, you can secure all your development and design data, personal information, health data, management documents or data of a staff or works council.
\nYou can find more information on our All-In-One security packages
here<\/a> or you can contact us via vertrieb@digitronic.net<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”195″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Support of all conventional Windows operating systems<\/h2>\n

Secure Logon™ 2.0 supports all Microsoft operating systems starting from Windows 7. This is true for both client as well as server operating systems. Here<\/a> you can find a full list of those operating systems.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/5″][vc_single_image image=”269″][\/vc_column][vc_column width=”4\/5″][vc_column_text]<\/p>\n

Made in Germany<\/h2>\n

Secure Logon™ 2.0 was not only developed and refined in Germany, we also did not outsource our support to a call center. Thus, you will get the direct support of the producer and distributor of the product. Do you have any specific adaptation requirements or need help? Just contact us and we will get in touch with you.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"

[vc_row][vc_column][vc_column_text] Service features of Secure Logon™ 2.0 [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Due to increasingly better methods of exposing user names and passwords, a classic logon that relies exclusively on the security factor password is no longer secure. However, mistyping continually changing and complex passwords also means an increase in support effort. Secure Logon™ 2.0 solves these problems in an … Continue reading “Features”<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"\nFeatures - Secure Logon<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Features - Secure Logon\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text] Service features of Secure Logon™ 2.0 [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Due to increasingly better methods of exposing user names and passwords, a classic logon that relies exclusively on the security factor password is no longer secure. However, mistyping continually changing and complex passwords also means an increase in support effort. Secure Logon™ 2.0 solves these problems in an … Continue reading "Features"\" \/>\n<meta property=\"og:url\" content=\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/\" \/>\n<meta property=\"og:site_name\" content=\"Secure Logon\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-22T08:43:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/\",\"url\":\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/\",\"name\":\"Features - Secure Logon\",\"isPartOf\":{\"@id\":\"https:\/\/2-faktor-authentifizierung.de\/#website\"},\"datePublished\":\"2018-10-01T19:27:31+00:00\",\"dateModified\":\"2022-08-22T08:43:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/2-faktor-authentifizierung.de\/en\/features\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/2-faktor-authentifizierung.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/2-faktor-authentifizierung.de\/#website\",\"url\":\"https:\/\/2-faktor-authentifizierung.de\/\",\"name\":\"Secure Logon\",\"description\":\"2-Faktor-Authentifizierung\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/2-faktor-authentifizierung.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Features - Secure Logon","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/","og_locale":"en_US","og_type":"article","og_title":"Features - Secure Logon","og_description":"[vc_row][vc_column][vc_column_text] Service features of Secure Logon™ 2.0 [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Due to increasingly better methods of exposing user names and passwords, a classic logon that relies exclusively on the security factor password is no longer secure. However, mistyping continually changing and complex passwords also means an increase in support effort. Secure Logon™ 2.0 solves these problems in an … Continue reading \"Features\"","og_url":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/","og_site_name":"Secure Logon","article_modified_time":"2022-08-22T08:43:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/","url":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/","name":"Features - Secure Logon","isPartOf":{"@id":"https:\/\/2-faktor-authentifizierung.de\/#website"},"datePublished":"2018-10-01T19:27:31+00:00","dateModified":"2022-08-22T08:43:53+00:00","breadcrumb":{"@id":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/2-faktor-authentifizierung.de\/en\/features\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/2-faktor-authentifizierung.de\/en\/features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/2-faktor-authentifizierung.de\/en\/"},{"@type":"ListItem","position":2,"name":"Features"}]},{"@type":"WebSite","@id":"https:\/\/2-faktor-authentifizierung.de\/#website","url":"https:\/\/2-faktor-authentifizierung.de\/","name":"Secure Logon","description":"2-Faktor-Authentifizierung","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/2-faktor-authentifizierung.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/pages\/46"}],"collection":[{"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":0,"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/pages\/46\/revisions"}],"wp:attachment":[{"href":"https:\/\/2-faktor-authentifizierung.de\/en\/wp-json\/wp\/v2\/media?parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}