HOTPin Now Supports TLS 1.2

TLS 1.2 is now compatible with Celstix HOTPin Authentication server.  Celestix HOTPin Authentication requires TLS 1.2 when installed on Windows Server 2016 or 2019 and earlier windows versions. TLS 1.2 offers major improvements over the older version, TLS 1.1. The most essential improvement, however, is in the encryption protocol. TLS 1.2 allows the use of… Continue reading HOTPin Now Supports TLS 1.2

Integrate Two-Factor Authentication with your cloud services to provide simple and secure access to your apps

As the number of cloud applications grow and continue to gain popularity within the business community by giving both mobile and static workforces a consistent experience when interacting with corporate data that is held within that Cloud App, the need to secure and police access to that corporate data becomes ever more critical to every… Continue reading Integrate Two-Factor Authentication with your cloud services to provide simple and secure access to your apps

Protect yourself from “Heartbleed” by using Celestix HOTPin Tokenless Two-Factor Authentication

Since the discovery of the ‘Heartbleed’ vulnerability in the open-source cryptography library OpenSSL (Which is used by approximately 17% of the world’s Secure HTTPS websites), it has meant there is a loophole whereby hackers can gain access to Usernames, Passwords, Private Keys and Session Cookies. But this vulnerability can be nullified by the use of… Continue reading Protect yourself from “Heartbleed” by using Celestix HOTPin Tokenless Two-Factor Authentication

OATH, Strong Authentication, and What it Means

If you’ve been reading up on the options for two factor authentication chances are you’ve come across the term “OATH-compliant” or “Based on the OATH standards”.  In this blog post I will explain in plain English what OATH means, what it stands for, and why it’s so important. What is OATH? The Initiative for Open… Continue reading OATH, Strong Authentication, and What it Means

Product Review: HOTPin v3.7 in Computing Security Magazine

HOTPin v3.7 received an excellent review in Computing Security Magazine this month. The review is based on a product test carried out by an independent testing firm which was designed to challenge the claims made about the product in our marketing collateral. The reviewer deployed and configured the authentication server and then enabled the use… Continue reading Product Review: HOTPin v3.7 in Computing Security Magazine

Embracing the two-factor factor

One of the great things about two-factor authentication is that it is one of the rare solutions that can make a claim to increase security while reducing cost. It may seem unfeasible that implementing a technology such as two-factor authentication can actually lead to a reduction in cost, but evidence exists that indicates that substantiates… Continue reading Embracing the two-factor factor