ADVANCED AUTHENTICATION (2 FACTOR) KEEPS YOU COMPLIANT

Section 5.6.2.2 of the CJIS Security Policy requires that agencies use Advanced Authentication when accessing CJI from a non-secured location. Hosted 2 Factor Authentication from CJIS Solutions addresses the entire section and meets the Out-Of-Band requirement as well.

SIMPLISTIC

With a cop-simple solution that requires no servers to own, CJIS Solutions is the easy answer to 2 Factor Authentication. A simple, easy-to-use management portal keeps you in control without overwhelming you.

SAVE MONEY

No crazy fees here. There’s a one-time token purchase and since they never expire, there are no recurring purchases to make. Low per-user annual fees and unlimited free device agents keeps your costs WAY down.

HOW IT WORKS

Your tech installs a small, free agent onto the device that you want to secure. Once complete, users will need to gain access FROM our 2 Factor Solution from that point forward. A user will approach the device, and enter their user name, PIN Number, and one-time passcode from either the USB Key or phone app. Once they hit enter, the agent challenges the One Time Passcode against our server and either authenticateS or denies access. Its that simple.

MEET EVERY CJIS POLICY 2 FACTOR REQUIREMENT EVERYTHING YOU NEED – ONE LOCATION – LOW RATES

NO SERVER TO OWN

We’re hosting the authentication servers so there’s nothing for you to purchase or manage.

ACCESS FROM ANYWHERE

Users can authenticate against our hosted servers from anywhere. This keeps your devices secure no matter where they are.

USE WITHOUT INTERNET

Users are able to authenticate prior to 4G/Internet access.

LOW RATES

Tokens never expire and low annual per-user rates keep your costs WAY down.

COP SIMPLE

Easy to use, easy to understand. Our solution will stop headaches before they happen with non-tech-savvy officers.

HARD OR SOFT TOKENS

Choose from a phone app or USB key, both never go bad and never expire. No expiration dates mean no need to purchase twice.

YOU’RE IN CONTROL

A secure management portal puts you in complete control. Manage users, tokens, and access groups, all from an easy-to-use portal.

ACTIVE DIRECTORY INTEGRATION

Our solution works with or without active directory. A secure sync agent keeps your users up to date instantly.

FACT CHECK AGAINST THE POLICY