Check Point VPN Multi-Factor Authentication (MFA)

Secure access to Check Point VPN with LoginTC two-factor authentication (2FA). Easy for end-users to enroll and log into Check Point VPN and protected applications. Two-factor authentication helps prevent account takeovers.

Multiple authentication methods like Push-based authentication, Software One-Time Passwords (OTP), Hardware Tokens, Bypass Codes and Email One-Time Passwords ensure end-users can always login securely.

Direct integration with Active Directory means you can still leverage passwords as a first factor. Users can also be synchronized from Active Directory for a streamlined rollout.

Enable LoginTC with Check Point VPN to add multi-factor authentication (MFA) to your remote access deployment and keep your organization secure.

Frequently Asked Questions

Can a user use one token to login to every application?

Yes, a single LoginTC authentication token can be used to login to all your connected applications and services.

What authentication methods can I use to login?

You can use any of our LoginTC authentication methods, including:
 
Software OTP
Hardware OTP
Push Authentication
Desktop Authentication
SMS Passcode
Email Passcode
Phone Call
FIDO2 Token
Passcode Grid
QR Scan
Push Number Matching
Bypass Code
 
Contact us to discuss which authentication method might work best for your organization.

Does MFA get bypassed if the service can’t be reached?

No, LoginTC MFA cannot be bypassed.

Can I control who gets challenged with MFA?

Yes, you can control who gets challenged with static username lists, or Active Directory group membership.

Is this compatible with all Check Point VPNs?

Yes, this is compatible with all RADIUS-speaking Check Point VPNs.

Simple for end users

Easy Deployment Process

Utilize existing devices

Standardized for compliance

Trusted Worldwide

65+

Countries Served

10K+

Use Cases

2013

Year Released

Start your free trial today. No credit card required.

Sign up and Go