{"id":52708,"date":"2022-06-06T11:00:00","date_gmt":"2022-06-06T15:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52708"},"modified":"2023-02-09T20:22:58","modified_gmt":"2023-02-10T01:22:58","slug":"push-notification-mfa-using-jumpcloud-protect","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/push-notification-mfa-using-jumpcloud-protect","title":{"rendered":"One-Touch, Frictionless Multi-Factor Authentication Using JumpCloud Protect"},"content":{"rendered":"\n

The world\u2019s workforce has turned to remote work, resulting in employees accessing corporate resources from home and public networks. To Make (Remote) Work Happen, IT admins need a way to provide their employees with secure access to the resources they need to do their jobs without disrupting their day (perceived or otherwise) on whatever service they\u2019re accessing.<\/p>\n\n\n\n

Passwords alone are not enough<\/a> to secure these resources and prevent unauthorized access, as they can be easily compromised by brute force, phishing, and other techniques, potentially resulting in monetary losses for organizations. IT administrators have to introduce additional security measures to protect their organization’s resources.<\/p>\n\n\n\n

Multi-factor authentication (MFA)<\/a> provides such a measure that safeguards organizational resources and reduces the risk (and cost) associated with password compromise. It\u2019s a foundational security control for identity and access management (IAM) that can combine with conditional access<\/a> to ensure that unmanaged devices from unauthorized locations won\u2019t be granted access to vital IT resources.<\/p>\n\n\n\n

The inclusion of MFA to IAM configurations adhere to the cybersecurity requirements that are issued by international standards bodies such as ISACA, ISO\/IEC, NIST, and PCI SSC. These mature standards exist to safeguard confidential and private information from bad actors.<\/p>\n\n\n\n

MFA Doesn\u2019t Have to Be Difficult<\/h2>\n\n\n\n

However, implementing MFA<\/a> can be a difficult proposition, for both technical and political reasons. On the technical side, there are many options to choose from, both free and paid, which can be difficult to implement and may only cover a subset of IT resources depending upon their specific requirements and capabilities. In addition, end users may be resistant to adopt MFA, especially if the process to verify additional factors is cumbersome, unreliable, or persistent.<\/p>\n\n\n\n

\"JumpCloud
JumpCloud Protect is user friendly and approachable<\/figcaption><\/figure>\n\n\n\n


MFA combats the growing challenges associated with mitigating cyberattacks, as well as those associated with rolling out Zero Trust security tools to end users who may be resistant to the increased requirements to access their resources. IT admins can use JumpCloud Protect as an MFA solution to implement
biometric authentication<\/a> (Touch ID), mobile push notifications<\/a>, and time-based, one-time passwords (TOTPs)<\/a>. It\u2019s available as an iOS and Android mobile app, and natively backed by JumpCloud\u2019s Directory Platform.<\/p>\n\n\n\n

\"Video<\/a><\/p>\n\n\n\n

JumpCloud Protect: Biometric, Push, and TOTP Authentication<\/h2>\n\n\n\n

IT admins can leverage JumpCloud Protect to extend MFA beyond cloud applications and secure all endpoints and resources, including on-premise applications, Mac, Windows, and Linux desktops, VPN and wireless networks, and servers.<\/p>\n\n\n\n

With JumpCloud Protect, IT admins can achieve:<\/p>\n\n\n\n