With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind in Federal IT.

As more end point devices and authentication use cases proliferate our ecosystem, the need for alternative non-PIV card, NIST SP800-63-3, AAL3 level hardware authenticators increases.  The Thales eToken Fusion series of devices are designed to tackle this need.  One of the recommended means to counteract attacks is to strengthen endpoints with MFA.  To thwart vulnerabilities with legacy authentication options such as OTP, SMS, and push notification, guidance has been published to recommend phishing-resistant forms of MFA such as FIDO2 and PKI.  This is exactly what the Thales eToken Fusion series gives you; both phishing-resistant authentication options on a single token (FIDO and PKI).  TAA compliant, EUCKLEAK-Free, FIPS certified, phishing-resistant tokens.

Agencies are tasked with complying with regulations while also ensuring that their IT infrastructure and operations are not disrupted. The most effective approach to support these various use cases is through a hybrid or fused method of authentication, such as a Thales’s Fusion (FIDO+PKI) device, that is resistant to phishing attempts.

Thales TCT’s  Phishing-Resistant MFA Solutions

  • Mitigate vulnerabilities such as EUCLEAK
  • Reduce risk of credential compromise with best-in-class security
  • Integrate seamlessly into your environment
  • Enable broad range of use cases

Enterprise FIDO Management

Thales eToken FIDO Enterprise Functionality (EF) gives agencies a way to centrally manage FIDO issuance and lifecycle.

  • PIN unblock without device reset
  • Token attestation enforcement
  • FIDO application whitelisting
  • Administrator controlled FIDO reset
  • Administrator enterprise management key
    • Retrieve Relying Party (RP) ID list
    • List all credentials for a specific RP
    • Delete and update FIDO credentials
    • Set minimum PIN length
    • Force change PIN
    • Set allowed RP ID list to get MinPin length information
    • Enforce user verification

EUCLEAK-Free Authenticators

Thales is aware of the “EUCLEAK” document released on September 3, 2024. This document is related to the specific implementation of the Infineon cryptographic library designed for the SLE78 chip family. Thales operating systems running on chips from the Infineon SLE78 family are relying on Thales developed & FIPS approved cryptographic libraries. Our experts have verified that the elements reported by the “EUCLEAK” document are not applicable to the design of Thales libraries implementation. As a consequence, Thales products are not impacted by the “EUCLEAK” topic.

Thales eToken Fusion Device Free Trial

Available Samples

Secure access to web applications and devices using FIDO

  • Ideal solution for organizations to go passwordless
  • Compact, tamper-evident USB tokens, available in type A and C (TAA-Compliant)
  • Presence detection sensor to confirm human presence
  • Ideal for privilege users, frontline and temporary workers
  • Quick access for employees to any shared device such as PC or tablet

Extend modern FIDO authentication to PKI use cases.

  • Support FIDO and PKI use case
  • Available in USB – A and USB-C
  • Help organizations extend FIDO authentication to PKI use cases
  • Help in complying with U.S. regulation:
    • Trade Agreement Act (TAA) compliant
    • FIPS 140-2 certified

Learn more about the eToken Fusion Series.

Streamlined login with NFC

  • Support FIDO and PKI use cases
  • Available in USB-C
  • Enterprise FIDO Ready:
    • FIDO2.1 certified
    • Thales FIDO enterprise features
  • Help in complying with U.S. regulation:
    • Trade Agreement Act (TAA) compliant
    • FIPS 140-3 certification in progress
    • Personal Identity Verification (PIV) compliant

Learn more about the eToken Fusion Series.

Request a Free Trial of Thales EUCLEAK-Free Authenticators

Please complete the form below to request a free trial of Thales Fusion Devices. Contact info@thalestct.com with any questions.

Requestor Information

Ship-To Information

Evaluation License Agreement

License Grant. Subject to the terms and conditions of this agreement, and upon acceptance of these terms by Licensee by signature below, SafeNet Assured Technologies, LLC.,(“Thales Trusted Cyber Technologies”), grants to Licensee (as defined below and in the attached Schedule A hereto), during the Term of this Agreement (as defined below), a temporary, non-exclusive license to use the Product(s) as defined and listed in the attached Schedule A hereto, and related documentation as provided by Thales Trusted Cyber Technologies to Licensee, for evaluation purposes only. This license does not include any rights to copy, alter, modify, reverse engineer, decompile, disassemble, make derivative works, rent, lease, disclose, sublicense, or otherwise transfer the Product, related documentation, or other proprietary information of Thales Trusted Cyber Technologies.. Notwithstanding the foregoing sentence, if Licensee is an authorized Thales Trusted Cyber Technologies reseller or distributor, Licensee may sublicense those rights granted herein to a customer or prospective customer of Licensee without right of further sublicense and transfer the Product to such sublicensee for evaluation purposes identical with those stated herein, provided that Licensee shall be fully liable for any acts or omissions of the sublicensee with respect to the Product and provided further than any acts or omissions of such sublicensee shall be attributable to Licensee for purposes of this Agreement and Licensee shall be liable therefor. Thales Trusted Cyber Technologies shall provide no support or maintenance services with respect to the Product.

Ownership. The Product, the related documentation, and all authorized copies thereof, shall remain the exclusive property of Thales Trusted Cyber Technologies., and shall not be used in any way other than as allowed by this Agreement, and shall not be disclosed to any third party. Licensee acknowledges that, as between Thales Trusted Cyber Technologies and Licensee, the Product and its related documentation and all copyrights, trade secret rights and other intellectual property rights with respect thereto, are and will at all times be the property of Thales Trusted Cyber Technologies., even if suggestions made by Licensee are incorporated into current or subsequent versions of the Product or related documentation.

Disclaimer of Warranty. LICENSEE AGREES AND ACKNOWLEDGES THAT THALES TRUSTED CYBER TECHNOLOGIESSHALL HAVE NO RESPONSIBILITIES TO LICENSEE TO CORRECT ANY DEFECTS OR PROBLEMS IN THE PRODUCT OR THE RELATED DOCUMENTATION, OR TO ASSURE THAT THE SOFTWARE OPERATES PROPERLY. THALES TRUSTED CYBER TECHNOLOGIESDISCLAIMS ANY AND ALL WARRANTIES WITH RESPECT TO THE PRODUCT AND THE RELATED DOCUMENTATION, WHETHER EXPRESS OR IMPLIED, INCLUDING SPECIFICALLY THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE PRODUCT AND THE RELATED DOCUMENTATION IS PROVIDED “AS IS”, AND LICENSEE UNDERSTANDS THAT IT ASSUMES ALL RISKS OF ITS USE, QUALITY, AND PERFORMANCE.

Liability. Thales Trusted Cyber Technologies shall have no liability whatsoever to Licensee in connection with this Agreement, including without limitation, liability for any problems in or caused by the Product or the related documentation, whether direct, indirect, special or consequential (including lost profits). Licensee shall be liable to Thales Trusted Cyber Technologies for any losses, costs or damages arising from damage to the Product that occurs while the Product is in Licensee’s possession.

Return of Product. Licensee agrees to return the Product to Thales Trusted Cyber Technologies., to be received by Thales Trusted Cyber Technologies within ten (10) days of the end of the Term. Furthermore, if the Product includes software, Licensee shall destroy or erase all copies of such software in its possession at the end of the Term. If the Product is not so returned to Thales Trusted Cyber Technologies within ten (10) days of the end of the Term, Thales Trusted Cyber Technologies will invoice and Licensee shall pay for the Trusted Cyber Technologies. Product by Purchase Order or credit card and Licensee’s rights in the Product shall be as stated in the Thales Trusted Cyber Technologies Standard Terms and Conditions of Sale current as of the end of the Term, unless an extension to this Agreement is made in writing by Thales Trusted Cyber Technologies and Licensee. The parties agree that this Agreement is the complete and entire agreement of the parties and supersedes all previous communications between them relating to the license and to the subject matter hereof.