Gemalto’s GrIDsure flexible authentication method
allows an end-user to generate a one-time password without the requirement for hardware tokens or software applications. GrIDsure tokens work by presenting the end-user with a matrix of cells which contain random characters, from which they select a 'personal identification pattern' (PIP).
Whenever a user wishes to authenticate to a protected resource, they are presented with a challenge grid containing random characters. The user then enters the characters in the cells that correspond to their PIP.
The end result is far superior to static passwords. Every time the challenge grid appears, the characters in the cells are different, so the user is always entering a one-time passcode. Plus, there's no hardware to lose.
GrIDsure is supported by SafeNet Authentication Service, and can be used to protect a wide range of use cases, including:
Grid tokens can be customized to optimize the user logon experience and changing security policy.
Grid Sizes Offered:
Grid Character Sets Offered:
Any application supported by SafeNet Authentication Service, including:
Gemalto SafeWord was good enough for our needs, but we evaluated SafeNet Authentication Service and found it met all our requirements and was less expensive! We were already a happy customer, and we’re even happier now.
Head of Information and Communications Technology Management Unit
Albert Schweitzer Ziekenhuis
Download the Case Study
Providing unparalleled convenience to end users and simple deployment to IT staff, Gemalto GrIDsure Authentication is a pattern-based authentication solution that overcomes the weakness of passwords without the need for software to be installed or hardware to be provisioned.
Proof of authentication is rarely foolproof. This paper gives a detailed overview of different types of authentication methods and their underlying security mechanisms, and discusses how various methods are effective in mitigating different types of attacks.
Learn more about simple and secure out-of-band authentication with push notifications, which let users authenticate with a single tap of a button on their mobile device, while offering set-and-forget management and advanced security features.
With all the demand for mobile usage in the enterprise environment, how are IT professionals addressing access and security concerns? Gemalto wanted to find out, and polled 900 IT decision makers from across the globe in July 2015. This report presents a summary of the survey results and what they mean for the future of mobility in the workplace.
Demand for greater employee mobility and flexibility is increasing across verticals. However, several challenges are holding back many organizations in the quest for increased mobility. Enterprises can follow a few important guidelines, as described in this eBook, to provide their employees with convenient, secure, scalable, compliant and cost effective mobility.