Access Restrictions

Terminal / HENNGE One’s unauthorized access control services such as multi-factor authentication, depasswordization, etc.

Various measures against unauthorized access, such as terminal authentication, multi-factor authentication, and de-passwording
Various measures against unauthorized access are available.

diagram access limiting system

Four points provided by HENNGE

Point1

ID/password theft prevention

Even if ID/password is stolen by cyber-attack, multi-factor authentication (MFA) can prevent access to the system, and prevent viewing and stealing of internal information.

Point2

First Step to Zero Trust

Access control, the entry point to the zero-trust model, is achieved through device certificates that determine the legitimacy of the device and identity authentication using push notification-type applications that determine the legitimacy of the user.

Point3

Certificate authorized by a third-party certification authority

Since the device certificate is authorized by a third party, there is no need to worry about it being duplicated and misused. Control by certificate is strictly based on the device identifier, so unauthorized access from unauthorized devices can be eliminated.

Point4

Flexible policy settings

Access policies can be created by combining multiple elements using AND and OR conditions. It is also possible to flexibly configure the policy settings to determine to whom (which group) the access policy is applied.