1. /
  2. Products & Solutions/
  3. Products/
  4. Symantec User Authentication Solutions/
  5. Validation and ID Protection Service

Symantec Validation and ID Protection Service (VIP)

Protect networks, applications, and data against unauthorized access

Symantec Validation and ID Protection Service is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers. A unified solution providing both two-factor and risk-based token-less authentication, VIP is based on open standards and can easily integrate into enterprise applications.

Key Features

  • Cloud-based authentication service deploys without requiring hardware or software installation.
  • Wide choice of hardware and software one-time password (OTP) credentials, including free mobile phone credentials
  • One-tap push verification technology included with mobile credential.
  • Leverage device and behavior profiling to deliver strong authentication without requiring hardware or software credentials.
  • Integrates with enterprise infrastructure via RADIUS out-of-the-box or through plug-ins into popular enterprise applications. Find a complete list of third-party integrations.
  • Out-of-box self-service application–including token activation, token synchronization.

Key Benefits

  • Enables compliance: Helps enable compliance by establishing controls over access to sensitive networks, applications, and data
  • Reduces capital costs: Eliminates the expense of building and maintaining in-premise infrastructure
  • Accelerates time-to-security: Speeds deployments by eliminating infrastructure and physical tokens
  • Delivers scalability: Carrier-class availability and reliability accommodates rapid changes in user base

Community Spotlight

To protect your enterpise, protect your vendors

Let Home Depot be your example We talk a great deal about using strong authentication to secure access for enterprise employees, but often we don’t think about how breaches to vendors could make our own enterprise vulnerable.  In some cases all an attacker needs is to steal the username and...

Posted: 7-Nov-2014 1:25:59 PM

CONTACT US