Multi-factor
authentication
with IDEE

AuthN by IDEE enables multi-factor authentication (MFA) without the need to enter a password or token or use a second device: technical, convenient, secure.

Get advice now

idee-partner-mobile-logo
EBF-Partnerprodukt: Idee
Security für mobile Devices

MFA 2.0 : The secure access solution for the modern workplace

Many end devices, different login locations, countless business apps, high levels of cybercrime – today’s working world is complex and vulnerable. This is where IDEE’s solution, which pursues a completely new authentication concept, comes in: AuthN by IDEE completely replaces passwords with strong, device-based authentication – no tokens, no second device, and great convenience for users. 100% protection against phishing attacks. When there are no more sensitive access data to steal, there is no more surface area for attack. How does it work? We’ll show you.

OUR SOLUTION

AuthN makes MFA secure, compliant, and user-friendly

Nowadays, a strong security solution for authentication is no longer a “nice-to-have” – it is indispensable. Even the first access to the digital ecosystem should be secure, compliant, and user-friendly. With AuthN by IDEE, companies reach a whole new level: Thanks to PKI, TPM/Secure Enclave, blockchain, and strong encryption, the device connection is secure from the very first connection – and convenient at the same time for every subsequent authentication.

The tool works with the Trusted Platform Module (TPM) chip, which is located in end devices, as well as with public key cryptography. The first factor (cryptographic key) is created and stored securely on the TPM of the user’s device. This key can only be used if users have verified themselves with the second factor via fingerprint, FaceID, or PIN (two-factor authentication; 2FA). This means that only a trusted person with a trusted device can log in to a trusted platform or system – with two-factor authentication that only requires one step from users. This makes it impossible for cybercriminals to take over accounts or gain unauthorized access.

SECURITY FOR EMPLOYEES AND CUSTOMERS

Your strong advantages

    • Zero-agent architecture enables rollout in minutes
    • Secure onboarding of new colleagues even without a preconfigured device
    • NIST-compliant in accordance with digital identity and authentication guidelines
    • Built as a zero-trust application on a FIDO2-compatible architecture
    • Multi-layered security strategy for every action
    • Strong PSD2-compliant authentication
    • Based on proven technology: PKI, TPM/Secure Enclave, blockchain, and strong AES-256-bit and ECC-512 encryption
    • Fully decentralized asymmetric keys stored in the device’s security chip

Get advice now

OUR SERVICES

From licensing to consulting and support, we are at your side

As an IDEE MSP, we combine our tool knowledge with our expertise from countless UEM and security projects. Our goal: reliable connections for your employees when working on the go and good error analysis and data overview for IT teams.

  • Licensing

    We provide you with licenses for AuthN by IDEE quickly and easily and are also happy to accompany you during a non-binding trial period and provide you with the necessary trial licenses.

  • Consulting

    Our experts will advise you on all aspects of using AuthN by IDEE in your company. How does the solution work? How does it fit into your existing security concept and IT environment? What should you consider during configuration and implementation?

  • Implementation

    For AuthN by IDEE to add value, the solution must be seamlessly integrated into your existing IT environment—between access methods, user directories, and on-premises or cloud resources. With our server and network experts and many best practices at our disposal, this is no problem at all.

  • Support

    Even after implementation, we are at your side with comprehensive operational support and assistance services. Because only smooth operation keeps users and IT teams happy in the long term.

OUR ADDED VALUE

Why you should implement the solution with us

For over 30 years, we have been accompanying companies on their journey to modern and secure IT and working environments – with unparalleled experience. Our team brings in-depth expertise, genuine passion, and a great deal of curiosity for complex tasks. In short: we know and love what we do.

  • Everything from a single source

    Consulting, licenses, implementation, and support—our experts for a modern workplace offer you the complete package.

  • Maximum flexibility

    We love and embrace change. We respond quickly and skillfully to new requirements and are in close contact with the manufacturer.

  • With passion

    We put our heart and soul into your projects and don’t stop until you are delighted.

  • With a comprehensive view

    We think in a networked way and ensure perfect integration into your device management and security setup.

  • Certified and secure

    We know what we’re talking about. This is also proven by our certifications – for leading technologies as well as for ISO 27001.

Frequently asked questions and answers

Authentication confirms the identity of users (e.g. through a password or biometric features), while authorization determines what rights users have in the system—i.e. what data and functions they are allowed to access.

Two-factor authentication combines two independent factors to verify a user – e.g. password + SMS code or password + fingerprint. This significantly increases security, as a stolen password alone is no longer sufficient to gain access to an account.

While 2-factor authentication combines exactly two factors, multi-factor authentication (MFA) can also use three or more factors – such as password, security token, and facial recognition simultaneously. MFA thus offers an even higher level of protection.

Cyberattacks are becoming increasingly sophisticated – stolen access data is no longer a rarity. MFA significantly reduces the risk, as even if passwords are compromised, unauthorized access is not possible if other factors are missing.

Modern solutions such as conditional access, single sign-on, and hardware tokens enable the easy integration of secure authentication procedures. We would be happy to advise you on how to implement the right 2FA or MFA strategy and make your IT security future-proof.

ContactCurious?Then get in touch with us.

We would be happy to advise you on creating a modern and, above all, safe workplace.

Mitarbeiter in einem Workshop
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.