A token-based device is triggered by the time of day, so every minute the password changes, requiring the user to have the token with them when they log in.
« Back to Glossary IndexA token-based device is triggered by the time of day, so every minute the password changes, requiring the user to have the token with them when they log in.
« Back to Glossary Index© 2024 Cyberlandia.
Technologies
Zero Trust
Global Cloud Infrastructure
Secure Web Gateway (SWG)
Cloud Application Control (CASB)
Remote Browser Isolation (RBI)
Secure Email Gateway (SEG)
Email Encryption Enforcement
Identity Access Management (IAM)
Two-Factor Authentication (2FA)
Single Sign-On (SSO)
AntiVirus (A/V)
Data Loss Prevention (DLP)
SSL/TLS Inspection
Mobile Security
Resource Library
Brochures
Data Sheets
Videos
Webinars
Security Snapshot
Are you secure now? Use this test to understand your current level of cybersecurity.
Security ROI
Is cybersecurity worth the expense for your organization? Find out here.
Cybersecurity Competitive Matrix
See why the Cyberlandia solution is the most comprehensive solution.