Why Token-Based Security Works - Infinity Network Solutions

Infinity Network Solutions takes security seriously and we take our clients’ security even more seriously.  Over the last few months, we have implemented a security software which creates an added layer of authentication and also creates a single point of failure to allow/deny access to our systems.  The program uses encryption of a token (number sequence) and also uses a user-designed PIN code.  This is being done so that we can further protect our data.

Each user within our company is assigned a token, and they have the token application installed on their smartphones (i.e. iPhone, Droid, Windows, etc.).  When the token is “launched”, it creates a unique sequence of numbers that is available for 30 seconds.  The user enters the token sequence as well as their previously-established PIN to log into the resource they need.  This security policy set has been implemented on our own network servers, and we are in the process of rolling it out to our managed service clients.

If you would like more information on how you can leverage a token-based security policy for added protection of your network resources, please Contact Us today.