1. /
  2. Products & Solutions/
  3. Products/
  4. Symantec User Authentication Solutions/
  5. Validation and ID Protection Service

Symantec Validation and ID Protection Service (VIP)

Protect networks, applications, and data against unauthorized access

Symantec Validation and ID Protection Service is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers. A unified solution providing both two-factor and risk-based token-less authentication, VIP is based on open standards and can easily integrate into enterprise applications.

What are Agents, Options and Add-ons

Agents are required for a product to operate on a certain platform.
Agents, options and add-ons are used to extend the functionality of the base product.

Agents

VIP Access For Mobile

VIP Access for Mobile transforms popular smartphones, such as the iPhone, into a free one-time password credential for use with the Symantec Validation and ID Protection Service.
For Businesses:
  • Increases security
  • Cost-effective
  • Easy to deploy
  • Readily adoptable
  • Standards-based
For Consumers:
  • Greater protection
  • Convenient
  • Easy to use
  • Valid at any VIP member site
Show MoreShow Fewer

VIP Network

Consumers can use their VIP credential at any member web site that displays the Symantec VIP logo.
Become a VIP Network Member to:
  • Reduce fraud and support compliance for PCI, Sarbanes-Oxley, FFIEC, OMB/NIST Level 3, HIPAA, and FACTA Red Flags.
  • Differentiate your business at a time when loyalty is low and switching providers is easy.
  • Win customers over with the convenience and security of online transactions.
  • Eliminate the cost and effort of managing tokens or smart cards.
  • Complement other forms of credentials you may offer.

Related Information

Options

Intel IPT

The Intel Identity Protection Technology (IPT) delivers a hardware-embedded strong authentication credential for VIP to protect enterprise and consumer access to online services without the need for additional hardware or software.
For Businesses
  • Increases security
  • Cost-effective
  • Easy to deploy
  • Readily adoptable
  • Standards-based
For Consumers
  • Greater protection
  • Convenient
  • Easy-to-use, hard-to-lose
Show MoreShow Fewer

Third-party Integrations

Symantec VIP supports integration with many popular enterprise applications. The following is a list of our current integrations:
Apache Networks
  • Apache HTTP Server
Array Networks
  • Array SSL VPN
Barracuda Networks
  • Barracuda SSL VPN
Computer Assoicates
  • Siteminder
Check Point
  • SSL VPN Software Blade
  • Firewall Software Blade
  • IPSec VPN Software Blade
Cirix System
  • Citrix Access Gateway
  • Citrix GoToMyPC
  • Citrix Netscaler
  • Citrix XenApp
Cisco Systems
  • Cisco Secure ACS
  • Cisco Adaptive Security Appliances
  • Cisco ICE
  • Cisco VPN
F5 Networks
  • BIG IP APM
  • Firepass VPN
IBM Corporation
  • IBM Tivoli Access Manager
Juniper Networks
  • Juniper SA VPN
  • Juniper Steel Belted Radius
Microsoft Corp.
  • Active Directory Federation Services
  • Microsoft Credential Provider
  • Threat Management Gateway (2010)
  • Internet Acceleration Server (2006)
  • Microsoft Forefront Unified Access Gateway
  • Microsoft GINA
  • Network Policy Server (NPS)
  • Internet Information Server (IIS) 7 and 8
  • Outlook Web Access
  • Remote Desktop Web Access
  • SharePoint Portal Server
Netmotion
  • Netmotion with SBR (Steel Belted Radius)
Oracle Corporation
  • OpenSSO
  • Oracle Access Manager
Oracle Corporation and Red Hat
  • Pluggable Authentication Modules
Salesforce
  • Salesforce integration with ADFS
SAP
  • Netweaver
SonicWALL
  • SonicWALL Aventail® SSL VPN
Third Party IDP
  • ADFS as IDP for SSP
VMWare
  • VMWare View 5.1

Community Spotlight

To protect your enterpise, protect your vendors

Let Home Depot be your example We talk a great deal about using strong authentication to secure access for enterprise employees, but often we don’t think about how breaches to vendors could make our own enterprise vulnerable.  In some cases all an attacker needs is to steal the username and...

Posted: Nov 7, 2014 1:25:59 PM

CONTACT US