Excite IT, Brace168, and VITCS Merge to Form Excite Cyber: A New Era of Fearless Technology Solutions > Learn more
Check Point Harmony Authentication
As we continue to work remotely and consume key business resources as services – the shared responsibility model for these externalised services demands strong and intelligent authentication.
The traditional ‘function: security’ spectrum has always tended to be less user friendly, requiring users to present credentials and knowledge, as well as responding to various challenges and checks with authenticating to high-value assets.
Companies are working to ‘right size’ the amount of friction authentication demands from users, to find the balance between sufficiently strong authentication, and the extent this places some requirement on users.
Check Point Harmony includes a range of built-in capabilities to reduce friction while still delivering strong authentication. Some examples of this includes;
Leveraging machine certificates to assure remote network access is only granted via permitted devices.
Device enrolment to restrict access to sensitive services such as O365.
Network aware and geo-fencing capabilities limit access according to user location.
Multichannel challenge/response methods to assure identity within the authentication workflow.
Frontend Single Sign-On (SSO) for secured web services to reduce login-layering and password fatigue while still maintaining strong authentication.
These capabilities are integrated across the Harmony range (Endpoint, Mobile, Email and Collaboration and Connect), and deliver strong authentication with an appropriate amount of friction.