Facing Credential attacks and cyber threats? emAS MFA can safeguard your digital infrastructure

Stay One Step Ahead of Cyber-Attacks at All-time Using emAS MFA In adjusting to the new normal, access and authentication has taken a significantly more prominent role in the IT Security landscape of today. eMudhra has been working in Identity & Digital Trust for over a decade and has been instrumental in bringing some of …

emAS MFA – The Need for Strong Authentication

Businesses and consumers alike world over are encouraged to adopt Two-factor Authentication (2FA) as a means of strengthening their security apparatus. But 2FA isn’t ironclad and the recent cyber-attack in Germany wherein hundreds of bank accounts were drained after hacking the routing system and redirecting text messages is a testimony to this fact. In such …

Stay One Step Ahead of Cyber-Attacks at All-time Using emAS MFA

Want to provide fool-proof security without compromising user experience? Then look no further than emAS MFA, eMudhra’s proprietary multi-factor authentication solution that supports over 15 modes of authentication. The fact that 400+ companies, including some of the biggest banks in India and around the world use emAS MFA to authenticate over 10 million transactions every …

emAS MFA – Addressing the Need for Strong Authentication

Businesses and consumers alike world over are encouraged to adopt Two-factor Authentication (2FA) as a means of strengthening their security apparatus. But 2FA isn't ironclad and the recent cyber-attack in Germany wherein hundreds of bank accounts were drained after hacking the routing system and redirecting text messages is a testimony to this fact. In such …

Moving beyond OTP and 2FA – emAS MFA

  NIST (National Institute of Standards and Technology) is no longer recommending OTP's as a form of authentication.-https://www.schneier.com/blog/archives/2016/08/nist_is_no_long.html Given today’s threat landscape, good security requires strong authentication practices. Passwords and OTP's are no longer considered secure, which is why there is a need to use other forms of authentication that is based on a combination …