TokenOne Authentication

You May Also Like

ESET PROTECT Complete
(666)
Cyber & Data Security Software
Visit Website
New Relic
(432)
Application Performance Monitoring (APM) Software
Get a Demo
Intruder
(154)
Cyber & Data Security Software
Visit Website

What is TokenOne Authentication?

Based on proven One-Time Pad principles from the Cold War, TokenOne is the strongest form of software-based Two-Factor Authentication (2FA) for organizations of all sizes.

How Is TokenOne Different From Other Authentication Systems? The key differentiator to other authentication services is that TokenOne proves user presence. We provide genuine strong Two-Factor Authentication as both factors are strong. There are three accepted factors in Authentication:

  1. Something you know – the knowledge factor
  2. Something you have – the possession factor
  3. Something you are – the inherence factor

With TokenOne you never reveal your secret PIN – so the knowledge factor remains strong. Unlike other solutions that rely on the user entering a ‘secret’ (usually a password) to prove they know it, TokenOne changes the knowledge factor paradigm by enabling proof of the knowledge factor without ever revealing it. This makes the TokenOne PIN a ‘zero-knowledge password proof’ and sets a new standard for Authentication.

The second factor, the possession factor, is your smart device. This has been profiled and must also be present to prove you are an authorized user.

With TokenOne Authentication both factors are strong. TokenOne allows organizations to prove who is accessing your site or service. This is vital not only for the security of sensitive information but also for compliance.



TokenOne Authentication currently scores 55/100 in the Cyber & Data Security category. This is based on press buzz (26/100), and other relevant information on TokenOne Authentication gathered from around the web.

The score for this software has stayed the same over the past month. What is this?
www.tokenone.com
  • TokenOne Authentication
  • TokenOne Authentication

Cyber & Data Security Market Radar

Artboard 1 copy 4

TokenOne Authentication Product Overview

  • Best of breed user authentication

  • TokenOne “Keeps Secrets Secret!”

  • The strongest form of software-based Two Factor Authentication security

  • With TokenOne a user’s secret PIN is never entered, transmitted or even stored anywhere

  • The TokenOne PIN is a "zero knowledge password proof"


Languages Supported: English

TokenOne Authentication Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

TokenOne Authentication FAQs

What are some applications TokenOne Authentication is commonly used in tandem with?

Some Applications TokenOne Authentication is commonly used with are RADIUS, SAML, Window Server, ADFS, and Office 365.

What is TokenOne Authentication generally used for?

TokenOne Authentication is used for secure authentication to different types of software and platforms in a way that never reveals the users' credentials and proves user presence.

Does TokenOne Authentication offer guides, tutorials and or customer support?

Yes.

What platforms does TokenOne Authentication support?

TokenOne Authentication supports Android, Windows mobile and IOS.

Does TokenOne Authentication integrate with any other apps?

TokenOne can be integrated into any apps using our pre-configured connectors or through our APIs.

Does TokenOne Authentication offer multi-user capability (e.g. teams)?

Yes.

Does TokenOne Authentication offer an API?

Yes.

Who are the main user groups of TokenOne Authentication?

The main user groups are companies/enterprises and their employees and clients.

TokenOne Authentication Alternatives

TokenOne Authentication Alternatives & Competitors

OneTrust
OneTrust
  142 89/100
Cyber & Data Security Software
Proofpoint
Proofpoint
  300 92/100
Cyber & Data Security Software
Mimecast
Mimecast
  285 90/100
Cyber & Data Security Software
Comodo Endpoint
Comodo Endpoint
  2 91/100
Cyber & Data Security Software
cWatch
cWatch
  31 88/100
Cyber & Data Security Software
Comodo Cloud Antivirus
Comodo Cloud Antivirus
  2 91/100
Cyber & Data Security Software

TokenOne Authentication User Reviews

No user reviews yet.
Rate this app or be the first to review it!
Page last modified:
Back to top