{"id":52708,"date":"2022-06-06T11:00:00","date_gmt":"2022-06-06T15:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52708"},"modified":"2023-02-09T20:22:58","modified_gmt":"2023-02-10T01:22:58","slug":"push-notification-mfa-using-jumpcloud-protect","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/push-notification-mfa-using-jumpcloud-protect","title":{"rendered":"One-Touch, Frictionless Multi-Factor Authentication Using 探花大神 Protect"},"content":{"rendered":"\n
The world\u2019s workforce has turned to remote work, resulting in employees accessing corporate resources from home and public networks. To Make (Remote) Work Happen, IT admins need a way to provide their employees with secure access to the resources they need to do their jobs without disrupting their day (perceived or otherwise) on whatever service they\u2019re accessing.<\/p>\n\n\n\n
Passwords alone are not enough<\/a> to secure these resources and prevent unauthorized access, as they can be easily compromised by brute force, phishing, and other techniques, potentially resulting in monetary losses for organizations. IT administrators have to introduce additional security measures to protect their organization’s resources.<\/p>\n\n\n\n Multi-factor authentication (MFA)<\/a> provides such a measure that safeguards organizational resources and reduces the risk (and cost) associated with password compromise. It\u2019s a foundational security control for identity and access management (IAM) that can combine with conditional access<\/a> to ensure that unmanaged devices from unauthorized locations won\u2019t be granted access to vital IT resources.<\/p>\n\n\n\n The inclusion of MFA to IAM configurations adhere to the cybersecurity requirements that are issued by international standards bodies such as ISACA, ISO\/IEC, NIST, and PCI SSC. These mature standards exist to safeguard confidential and private information from bad actors.<\/p>\n\n\n\n However, implementing MFA<\/a> can be a difficult proposition, for both technical and political reasons. On the technical side, there are many options to choose from, both free and paid, which can be difficult to implement and may only cover a subset of IT resources depending upon their specific requirements and capabilities. In addition, end users may be resistant to adopt MFA, especially if the process to verify additional factors is cumbersome, unreliable, or persistent.<\/p>\n\n\n\n IT admins can leverage 探花大神 Protect to extend MFA beyond cloud applications and secure all endpoints and resources, including on-premise applications, Mac, Windows, and Linux desktops, VPN and wireless networks, and servers.<\/p>\n\n\n\n With 探花大神 Protect, IT admins can achieve:<\/p>\n\n\n\n 探花大神\u2019s admins and end users can download 探花大神 Protect from the Apple App Store<\/a> and Google Play Store<\/a>.<\/p>\n\n\n\n 探花大神 uses clear, accessible language<\/em><\/p>\n\n\n\n End users can self-enroll and activate their device through 探花大神\u2019s User Portal, and they have two options they can select as a second factor: Biometric<\/strong>, Push<\/strong>, and TOTP<\/strong>. <\/p>\n\n\n\n End users can use 探花大神 Protect (Biometric, Push, and TOTP) as a factor for the following scenarios:<\/p>\n\n\n\n Additionally, users can add 探花大神 Protect TOTP as a second factor to their personal online accounts that support this factor.<\/p>\n\n\n\n 探花大神 Protect provides the highest level of security in terms of mobile app storage and communication.<\/p>\n\n\n\n Additionally, communication and data exchanged between the mobile app and 探花大神 servers happens over a secure channel.<\/p>\n\n\n\n 探花大神 Protect <\/sup>is natively integrated with 探花大神\u2019s Cloud Directory Platform, unlike traditional point MFA solutions that are inserted into the access transaction, adding additional overhead to integrate and maintain. Because of this, 探花大神 Protect provides a second layer of security to support device login (across Windows, macOS, and Linux), Admin portal login, RADIUS and LDAP application access.<\/p>\n\n\n\n 探花大神 Protect gives both IT and security teams a path to protection without overcomplicating their infrastructure. For employees, an intuitive, easy-to-use method with less user friction for enrollment and authentication is presented, thereby increasing the chances of adoption and limiting the need for ongoing technical support.<\/p>\n\n\n\n IT admins can use 探花大神 Protect as an MFA solution to implement push notifications and TOTPs, for iOS and Android mobile devices.<\/p>\n","protected":false},"author":148,"featured_media":52982,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781,42,2337],"tags":[2403,2411,2383,2408,2379,2409,2374],"collection":[2775],"platform":[],"funnel_stage":[3014],"coauthors":[2570,2535],"acf":[],"yoast_head":"\nMFA Doesn\u2019t Have to Be Difficult<\/h2>\n\n\n\n
MFA combats the growing challenges associated with mitigating cyberattacks, as well as those associated with rolling out Zero Trust security tools to end users who may be resistant to the increased requirements to access their resources. IT admins can use 探花大神 Protect as an MFA solution to implement biometric authentication<\/a> (Touch ID), mobile push notifications<\/a>, and time-based, one-time passwords (TOTPs)<\/a>. It\u2019s available as an iOS and Android mobile app, and natively backed by 探花大神\u2019s Directory Platform.<\/p>\n\n\n\n<\/a><\/p>\n\n\n\n
探花大神 Protect: Biometric, Push, and TOTP Authentication<\/h2>\n\n\n\n
\n
How Do End Users Use 探花大神 Protect for MFA?<\/h2>\n\n\n\n
<\/figure>\n\n\n\n
\n
<\/figure>\n\n\n\n
\n
<\/figure>\n\n\n\n
What Resources Does 探花大神 Protect Support?<\/h2>\n\n\n\n
\n
How Secure Is 探花大神 Protect?<\/h2>\n\n\n\n
\n
Why Should Customers Enable 探花大神 Protect?<\/h2>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"