VPN

Virtual Private Networks (VPNs) provide secure remote access. This access requires immensely strong authentication.

We have been integrating with VPNs for over 10 years and now have a wide range of solutions that allow you to use Swivel authentication with your VPN of choice.

Our integrations support a number of different ways of authenticating.  Swivel authentication can be combined with other authentication, eg LDAP.  Authentication can be implemented as single-channel, or dual-channel authentication.

At the centre of most VPN integrations is Swivel’s built-in RADIUS server. VPNs can be configured to use external RADIUS servers for authentication, so Swivel authentication can be integrated very easily.

We regularly integrate Swivel with industry standard VPN solutions including Microsoft and Check Point and many others.

Our integrations include modifications to the login pages so that they are optimised for the authentication process you choose to adopt, e.g. allowing for the inclusion of in-browswer imagery or using one of our 2FA solutions.  This provides a completely seamless integration.

Integration Guides

We have a number of integration guides, available on our knowledgebase that explain the steps required for VPN integration.

If you require information about a VPN not listed, contact support@swivelsecure.com. If you are a VPN vendor and would like to add Swivel support to your products, we will be happy to discuss working with you to develop a solution.

Our authentication platform allows VPN access using a wide variety of devices, including two factor authentication via  mobile app, SMS, OATH token and  telephony  and stronger authentication via  intregrated in-browser imagery.

A key, and unique feature, of our authentication platform is our patented one-time-code extraction protocol PINsafe. PINsafe combines the use of registered PINs with random 10 digit security strings that are sent to you either by browser, mobile app, SMS and telephone either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Learn More

What our customers say

Get In Touch