With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind in Federal IT.
As more end point devices and authentication use cases proliferate our ecosystem, the need for alternative non-PIV card, NIST SP800-63-3, AAL3 level hardware authenticators increases. The Thales eToken Fusion series of devices are designed to tackle this need. One of the recommended means to counteract attacks is to strengthen endpoints with MFA. To thwart vulnerabilities with legacy authentication options such as OTP, SMS, and push notification, guidance has been published to recommend phishing-resistant forms of MFA such as FIDO2 and PKI. This is exactly what the Thales eToken Fusion series gives you; both phishing-resistant authentication options on a single token (FIDO and PKI). TAA compliant, EUCKLEAK-Free, FIPS certified, phishing-resistant tokens.
Agencies are tasked with complying with regulations while also ensuring that their IT infrastructure and operations are not disrupted. The most effective approach to support these various use cases is through a hybrid or fused method of authentication, such as a Thales’s Fusion (FIDO+PKI) device, that is resistant to phishing attempts.
Thales TCT’s Phishing-Resistant MFA Solutions
- Mitigate vulnerabilities such as EUCLEAK
- Reduce risk of credential compromise with best-in-class security
- Integrate seamlessly into your environment
- Enable broad range of use cases
Enterprise FIDO Management
Thales eToken FIDO Enterprise Functionality (EF) gives agencies a way to centrally manage FIDO issuance and lifecycle.
- PIN unblock without device reset
- Token attestation enforcement
- FIDO application whitelisting
- Administrator controlled FIDO reset
- Administrator enterprise management key
- Retrieve Relying Party (RP) ID list
- List all credentials for a specific RP
- Delete and update FIDO credentials
- Set minimum PIN length
- Force change PIN
- Set allowed RP ID list to get MinPin length information
- Enforce user verification