2. Three steps to deploying CJIS compliant
advanced authentication:
Authentication Methods Supported by 2FA ONE
1. Select the authentication technology that works best for your
organization
2. Install and deploy 2FA ONE
3. Enroll users
Need a low-cost option? Risk-based
authentication is a popular tokenless choice.
Want to leverage existing hardware
investments? Consider using the embedded
fingerprint or card readers in laptops.
Leverage an existing magnetic swipe reader
connected to your mobile units. Looking for
an easy-to-use solution for the officers?
Maybe opt for using an existing I.D. badge
used for building access. Concerned about
having the highest level of security?
Implementing digital certificates with
contact smart cards or tokens can be a great
solution. With deep experience in all kinds
of authentication, 2FA will help you select
the best fit for your agency today and keep
you future-proofed as the CJIS Security
Policy evolves.
• RFID Cards, Fobs, Tags, and enabled phones
• Smart Cards and USB Tokens with PKI
• Biometrics (fingerprint)
• Magnetic Stripe (Agency Issued ID Card or Driver’s License)
• Risk-based Authentication (tokenless)
• One-time password cards or tokens
With no additional appliances or servers to
purchase, customers routinely download
2FA ONE and are installed, configured, and
running in a matter of minutes. Automated
processes tie in to existing infrastructure
like Active Directory and mobile VPNs,
minimizing the effort required to get
started. Authentication method selection,
desired policies, and system preferences
are straightforward settings in an easy-to-
navigate web interface. Client installation
can be pushed out with standard desktop
publishing tools. In the event your agency
has specific environmental requirements,
our engineers are ready to walk you through
the process to make sure the experience is a
smooth one.
Enroll once. Authenticate anywhere. The
user enrolls in the system one-time, on
one machine, and then can roam to any
machine, including mobile units. Cases
such as forgotten cards or forgotten PINs
are handled automatically through easy to
understand self-service processes.
3. No modules,
no add-ons. ONE complete
authentication solution for today,
tomorrow, and future requirements.
• ADVANCED AUTHENTICATION
• PASSWORD MANAGEMENT
• SINGLE SIGN-ON TO PUBLIC SAFETY APPLICATIONS
• SELF-SERVICE PASSWORD RESET
• COMPLIANCE REPORTING
• SMOOTH ROAMING BETWEEN SYSTEMS
• ENABLES ENCRYPTION AND DIGITAL SIGNATURES
• AUTO DESKTOP LOCKING
• FUNCTIONALITY ON WINDOWS XP & WINDOWS 7
• SUPPORT FOR DOMAIN AND LOCAL LOGON
Verified by Veracode®
The technology in 2FA ONE is
the only strong authentication
solution to continuously
undergo rigorous third-party
validation by Veracode.
SC Magazine®
5-Star Award
Awards and accolades
for 2FA designs and
technology from industry
leading analysts and
trade journals such
as SC Magazine.
Info Security named
2FA ONE 2013’s
“Best Authentication
Product”
and
“Best Security Product
for Government”
Features of 2FA ONE
Concerned about keeping up with future CJIS
security requirements? 2FA is the only
solution that protects you from a rip-and-
replace scenario.
See 2FA ONE in action
Addison Police:
An Overview
Addison Police: An
In-Depth Look
4. 2FA Inc. is an Austin, Texas based, veteran-
owned, software company created on
the single vision of simplifying advanced
authentication. Since 2006, 2FA has been
at the forefront of technological advances
in security and authentication, with many
industry “firsts”.
To best serve agencies, 2FA has prioritized
interoperability with other systems
commonly found in the public safety
environments. 2FA ONE works seamlessly
out-of-the-box with solutions such as
ICS, Intergraph, Motorola, NetMotion,
New World Systems, Southern Software,
Spillman, SunGard, Tiburon, TriTech,
CryWolf, and many more.
Today, as 2FA continues to grow and
develop advanced authentication
software, the professional services team
assists our clients with services designed
to complement the 2FA ONE capabilities
in public safety. 2FA’s unique position as
a software development company with
deep experience and expertise in strong
authentication makes 2FA a perfect choice
to satisfy a broad range of advanced
authentication requirements.
About Us
10713 North FM 620
Suite 201
Austin, TX 78726
512.918.3200 phone
512.918.3206 fax
www.2FA.com
sales@2FA.com
ONE for Advanced Authentication
ONE for Password Management
ONE for Single Sign-On
ONE for Compliance Reporting
ONE for your Future Requirements
SOFTWARE SALES
HARDWARE SALES
SECURITY CONSULTING
SYSTEMS INTEGRATION
SOFTWARE DEVELOPMENT
MAINTENANCE & SUPPORT
TRAINING
What We Do