Thales' GrIDsure flexible authentication method allows an end-user to generate a one-time password without the requirement for hardware tokens or software applications. GrIDsure tokens work by presenting the end-user with a matrix of cells which contain random characters, from which they select a 'personal identification pattern' (PIP).
Whenever a user wishes to authenticate to a protected resource, they are presented with a challenge grid containing random characters. The user then enters the characters in the cells that correspond to their PIP.
The end result is far superior to static passwords. Every time the challenge grid appears, the characters in the cells are different, so the user is always entering a one-time passcode. Plus, there's no hardware to lose.
GrIDsure is supported by SafeNet Trusted Access, and can be used to protect a wide range of use cases, including:
Grid tokens can be customized to optimize the user logon experience and changing security policy.
Grid Sizes Offered:
Grid Character Sets Offered:
Compatible With: Any application supported by SafeNet Trusted Access, including:
Providing unparalleled convenience to end users and simple deployment to IT staff, Thales GrIDsure Authentication is Providing unparalleled convenience to end users and simple deployment to IT staff, Thales GrIDsure Authentication is a pattern-based authentication solution...
When this industrial enterprise decided to migrate to Microsoft Office 365 in the cloud, they assumed that they were protected. However, they found out the difficult way that only a stronger authentication and access management solution could provide them with more effective...
End users and IT teams are experiencing waves of high stress due to the pandemic and escalating cyberattacks. Thales offers a simple and highly secure authenticator app that makes login fast and secure throughout each login session, lowering risk and ensuring secure remote...
Survey of 300 IT professionals across USA and Brazil, shows that overreliance on passwords continues to compromise data security. Discover why Access Management and strong authentication are important in this day and age. Key Points/Stats from this Infographic: ...