Protectimus is an OATH-certified two-factor authentication solution that supports all standard algorithms of one-time passwords generation (HOTP, TOTP, and OCRA) and a wide range of hardware and software tokens, including absolutely new reprogrammable NFC tokens, convenient iOS and Android applications, and OTP delivery via SMS and Email. Our solution is available as a Cloud Service (the client uses our servers, which are carefully protected) or as a Platform (the client installs our 2FA solution on his own servers). What makes us different from our competitors? An individual approach to each client, an ability to customize their solutions to the client’s needs, a much lower support cost per user, and a number of advanced features enhancing the level of protection: transaction data signature or CWYS (Confirm What You See), smart identification, geographical and time filters.

Request Information

Compatibility

  • down-arrow Citrix Virtual Apps
    7.8, 7.7, 7.6 LTSR, 7.6, 7.5, 7.1, 7.0, 7.9, 7.11, 7.12, 7.13
  • down-arrow Citrix ADC
    11.0 VPX, 11.0 MPX, 10.5 VPX, 10.5 MPX, 10.1 VPX, 10.1 MPX, 10.0 VPX, 10.0 MPX, 11.1 VPX, 11.1 MPX, 12.0 VPX, 12.0 MPX, 13.0 VPX, 13.0 MPX
  • down-arrow Citrix Gateway
    11.0, 10.5, 10.1, 11.1, 12.0, 13.0
  • down-arrow Citrix Virtual Desktops
    7.8, 7.7, 7.6 LTSR, 7.6, 7.5, 7.1, 7.0, 7.9, 7.11, 7.12, 7.13

Videos

Product Details

Protectimus is an OATH-certified two-factor authentication solution that supports all standard algorithms of one-time passwords generation (HOTP, TOTP, and OCRA) and a wide range of hardware and software tokens, including absolutely new reprogrammable NFC tokens, convenient iOS and Android applications, and OTP delivery via SMS and Email.

Protectimus solutions are available in two forms: as a Cloud Service (the client uses our servers, which are carefully protected) or as a Platform (the client installs our 2FA solution on his own servers). Flexible API allows quick integration with basic programming languages such as Java, Python, PHP, etc. 

Cloud Service

  • Comprehensive SAAS-based solution for effective two-factor authentication integration.
  • Minimum costs. You pay only for what you actually use. You can activate, deactivate, or modify your service plan at any time.
  • Quick start. To begin working with our system, you simply need to register in the service and begin the integration with our service!
  • Quick integration. Protectimus has developed a set of auxiliary libraries for popular programming languages that will help you to quickly implement two-factor authentication into your project.
  • Turnkey package. The service offers you a cloud platform accessible 24/7, convenient monitoring and management tools, and a wide range of tokens.

Platform

  • Comprehensive two-factor authentication solution installed in your environment.
  • The speed of integration is the same as for the service.
  • Full control. You fully control all aspects of the authentication system’s operation, including the user database and other sensitive information.
  • Individual approach – a personal manager.
  • Additional protection. The platform does not require any connection with the outside world, so it can be used in isolated networks or networks that are protected by firewalls and other security features and tools.
  • Customizable based on a customer’s purpose and requirements. If you need any specific functions for the authentication system, the team can do it for you.

Features

What makes us different from our competitors is an individual approach to each client, an ability to customize the solutions to the client’s needs, a much lower support cost per user, and a number of advanced features, which enhance the level of the protection of the accounts from being hacked and guarantee the maximum convenience of use:

  1. Transaction data signature or CWYS (Confirm What You See). This function allows taking into account the key transaction data during the OTP generation. For example, the OTP can be generated on the basis of such data as the recipient’s name, the sum of transfer, the currency, etc. Thus, even if the attacker catches the OTP he cannot use it to confirm the fake transaction. CWYS function protects from the man-in-the-middle attacks, banking trojans, data modifications, automated transfer systems, etc.
  2. Smart identification. With this feature, the one-time password will be asked only when the user logs into his account from a new device or from a new browser. Thereby the client can maintain his users’ loyalty.
  3. Geographical and time filters. This feature allows the client to appoint the countries and time when his users can enter their accounts.
  4. Free software token Protectimus Smart compatible with the smartwatch Android Wear.