The Security Industry’s Coveted Excellence Award Winners and Finalists from all over the world were
Virtual Private Networks (VPNs) provide secure remote access. This access requires immensely strong authentication.
We have been integrating with VPNs for over 10 years and now have a wide range of solutions that allow you to use Swivel authentication with your VPN of choice.
Our integrations support a number of different ways of authenticating. Swivel authentication can be combined with other authentication, eg LDAP. Authentication can be implemented as single-channel, or dual-channel authentication.
At the centre of most VPN integrations is Swivel’s built-in RADIUS server. VPNs can be configured to use external RADIUS servers for authentication, so Swivel authentication can be integrated very easily.
We regularly integrate Swivel with industry standard VPN solutions including Microsoft and Check Point and many others.
Our integrations include modifications to the login pages so that they are optimised for the authentication process you choose to adopt, e.g. allowing for the inclusion of in-browswer imagery or using one of our 2FA solutions. This provides a completely seamless integration.
We have a number of integration guides, available on our knowledgebase that explain the steps required for VPN integration.
If you require information about a VPN not listed, contact firstname.lastname@example.org. If you are a VPN vendor and would like to add Swivel support to your products, we will be happy to discuss working with you to develop a solution.
Our authentication platform allows VPN access using a wide variety of devices, including two factor authentication via mobile app, SMS, OATH token and telephony and stronger authentication via intregrated in-browser imagery.
A key, and unique feature, of our authentication platform is our patented one-time-code extraction protocol PINsafe. PINsafe combines the use of registered PINs with random 10 digit security strings that are sent to you either by browser, mobile app, SMS and telephone either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Learn More