Two-Factor Authentication

Integrate Two-Factor Authentication with your cloud services to provide simple and secure access to your apps

As the number of cloud applications grow and continue to gain popularity within the business community by giving both mobile...

Protect yourself from “Heartbleed” by using Celestix HOTPin Tokenless Two-Factor Authentication

Since the discovery of the ‘Heartbleed’ vulnerability in the open-source cryptography library OpenSSL (Which is used by approximately 17% of...

OATH, Strong Authentication, and What it Means

If you’ve been reading up on the options for two factor authentication chances are you’ve come across the term “OATH-compliant”...

Product Review: HOTPin v3.7 in Computing Security Magazine

Product Review: HOTPin v3.7 in Computing Security Magazine

HOTPin v3.7 received an excellent review in Computing Security Magazine this month. The review is based on a product test...

Embracing the two-factor factor

One of the great things about two-factor authentication is that it is one of the rare solutions that can make...