Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

Cetrom Launches New Two-Factor Authentication Solution to Counter Cybersecurity Threats

07.13.2016

Cetrom, an industry-leading provider of custom cloud solutions that transforms the way SMBs succeed, announces the launch of its own multi-factor authentication solution, Cetrom Two-Factor Authentication (Cetrom 2FA). Cetrom 2FA is a security process that requires users to satisfy two levels of identification prior to accessing programs, servers or desktops. The solution will help its clients in the CPA and accounting, association and nonprofit, travel management and other industries counter cybersecurity threats.

Cetrom developed Cetrom 2FA to help protect client data from hackers actively working to steal important information. It requires two forms of authentication in order to access critical data and applications hosted in the cloud. For example, a user must login having a strong username and password combination along with a unique code sent to their smartphone via SMS text or they must identify a specific image they have selected.

Cetrom 2FA is a safer login alternative and will provide clients the following benefits:
• Elimination of a single point of access to programs, servers or desktops.
• Secure access to data and applications.
• Decreased risk of compromised login credentials.
• Instant notification of suspicious activity related to authentication requests.

Christopher Stark, president and CEO, Cetrom, said, “We are continuously updating our security measures and developing solutions to not only meet our client base’s security needs, but also meet evolving cybersecurity threats. Since cybersecurity threats are becoming more commonplace, it’s important for us to stay ahead of the curve and be proactive to ensure our clients’ vital data and applications remain safe and secure from spyware, malware and ransomware attacks. Cetrom 2FA will provide our customers with an additional level of protection.”

cetrom.net

Jul 13, 2006Cassie Balentine
ConnectWise Adding Microsoft Azure Support to Its Cloud Management ToolCloud-Based Data Quality Fuels Worldwide Growth for Melissa Data
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC