GATEKEEPER BLOG

Automatic PC lock software for HIPAA compliance in hospitals and clinics. Auto-locking unattended workstations instantly.

Benefits of Hardware Tokens for Authentication

IT administrators have many responsibilities that require elevated access to the systems that they are responsible for maintaining. This makes them attractive targets for attackers looking to penetrate the most sensitive systems that they control. It’s a well-known fact that many companies are still not taking appropriate measures to protect their privileged access. To complicate the problem, there are enterprises that do not enable additional security for their administrator accounts. The Verizon Data Breach Report points out that the top observed malware in 2020 was password dumping, which focuses on extracting credentials that can be reused at a later time. 

Hardware tokens for logging in reduces password resets and forgotten passwords.

Stronger Security using Hardware

Any attempt to reduce your attack surface must involve building additional security controls around privileged access. The National Institute of Standards and Technology recommends implementing multifactor tokens as an additional layer of security, particularly for senior executives and system administrators. This reduces the chance that attackers who got access to legitimate credentials can reuse them and successfully impersonate privileged users. Multifactor controls are highly effective as demonstrated by Microsoft. Their studies show that  99% of automated passwords attacks were stopped by implementing multifactor authentication.

A simple and highly effective solution to implement these defenses and enhance security involves proximity tokens for multifactor authentication. To authenticate successfully, two authentication elements are required: something you know, such as a password, and something you have; a hardware token. Access is only granted when both elements are present. If an attacker steals an administrator’s credentials, they will be unable to gain access to your systems without the token being present. The software can be configured to automatically lock a computer when the token is physically separated from a computer. This additional layer of security provides peace of mind and further reduces the chances of a compromise.

Automatic PC lock software for HIPAA compliance in hospitals and clinics. Auto-locking unattended workstations instantly using a proximity hardware token/key fob.

Google and several universities performed a study comparing account takeover prevention rates between different methods. The study showed that only users that used security tokens for 2FA had a 100% prevention rate against multiple account takeover methods including automated bots, bulk phishing attacks, and targeted attacks. Localized hardware token-based 2FA also minimizes the attack vector to physically in front of the computer. This is where protected buildings, gates, locked doors, and physical access control also contribute to the overall cybersecurity posture.

Easier to Manage Users = Fewer Mistakes

Provisioning and deprovisioning passwords are also simplified by using hardware tokens. For use cases where an administrator needs to share passwords with a user, a few simple steps in the administration portal can help accomplish this.

When employees depart, instead of trying to figure out every single account that a user has access to, proximity tokens can help automate the workflow necessary to reset or deprovision multiple account passwords. This allows to reduce administrative burden associated with employee turnover, reduce errors, and save time.

Login to your PC, Mac, websites, and software using proximity detection sensors. Passwordless 2FA. Replace passwords with a key to experience the benefits of hardware-based login.

Adoption of proximity tokens can enhance the security of your platforms by simplifying authentication (2FA/MFA) beyond what other methods can achieve. Flexibility for administrators and users make it a perfect addition to a well-thought security defense in depth strategy.

Capterra Best Value for Authentication Jun-20
Capterra Ease of Use for Authentication Jun-20

See GateKeeper proximity access control in action.

Take a self-guided tour of how your proximity-based access control can work.