Menu

Menu

Let's Talk!

Say Hello

Send us an inquiry quote request, using the form below and we'll get back to you as soon as we can.

Concern

Please enter a work email address

SEND

Okta Adaptive Multi-Factor Authentication

Secure access for your entire business because 81% of data breaches involved weak or stolen credentials.

 

According to 2017 Verizon Data Breach Investigative Report

 

Secure

 

Authentication for employees, partners, and customers accessing apps, systems, and devices

 

Simple

 

Simple for admins to deploy and maintain, without impacting end user productivity

 

Intelligent

 

Create intelligent policies based on login context that limit identity challenges to risky login attempts

 

 

Features

 

Multi-Factor Authentication

 

Implement a variety of different factors for authentication across usability and assurance levels:

 

Knowledge factors

Based on something the user knows

Possession factors

Based on something the user has

Biometric factors

Based on something the user is

 

 

 

Contextual Access Management


Set intelligent access and authentication policies based on login context

 


Location Context

•  New city, state, or country

•  New geo-location

 

 

Device Context

•  Device recognition

•  Device management

 

 

Network Context

•  New IP

•  Specified IP zones

•  Network anonymizers

 

 

Risk Context

 

Okta ThreatInsight: Create policies based on risk signals seen across Okta’s global dataset, such as high risk IP addresses

 

Enable a passwordless user experience with ThreatInsight

 

Use insights gathered from our Okta Integration Network to set risk-based authentication policies. After using ThreatInsight to confidently assess the risk of an authentication event, organizations can enable a passwordless experience for end users.

 

Okta Adaptive MFA - Push Notification

 

 

Enhanced user & admin experience

 

Adaptive MFA includes features that improve user experience while enhancing the security posture

✓ Authenticate without a password: Enable user authentication by using other factors in lieu of a password 

✓ Seamless enrollment: Self-service MFA enrollment during initial login

✓ Flexible authentication: Select from a variety of end user experiences, including 1-click authentication

✓ Simple reporting and auditing: Detailed authentication logs, such as login attempts, with preset reports for audits and easy integration with security tools

 

 

Nexus is the only authorized reseller of Okta in the Philippines.

 

 

Get in touch

Name

Designation

Company

Industry

Phone

Work Email

Please enter a work email address

Comments

PRIVACY STATEMENT

 

Compliance with the Data Privacy Act of 2012

 

NEXUS acknowledges that it is subject to the Data Privacy Act of 2012 and its implementing rules and regulations, to which NEXUS shall have certain obligations with regard to the privacy, use and protection of personally identifiable information of clients or users. NEXUS shall protect and keep confidential all personally identifiable information about these individuals whom NEXUS has collected personally identifiable information obtained by NEXUS in the performance of its duties. NEXUS shall collect and use the information only to the extent necessary to exercise its rights or perform its obligations for which such information was disclosed to NEXUS. NEXUS shall ensure that its personnel shall not attempt to access, or allow access to, any information collected from the product microsites.

 

Protected Information

 

NEXUS is committed to ensuring that the individual’s privacy is protected. Should NEXUS ask the individual to provide certain information by which that individual can be identified when using this website, then the individual can be assured that the information will only be used in accordance with this Privacy Statement. This Privacy Statement will deal with the following:

1. The personal information collected, used, and shared.
2. Choices available with regards to personal information
    ● Answering of Inquiries
    ● Providing Feedback
    ● Processing of Applicants
1. The security procedures in place.
2. Correction of any inaccuracies in the information.

 

Information Management

 

All information will remain confidential and such information collected will only be those which the individual has voluntarily given to NEXUS via email or other direct contact. NEXUS will not give this information to anyone, unless such is necessary for the processing of the individual’s information for inquiry, feedback, or application purposes.

The individual shall also have the option to allow NEXUS to contact him or her via email in the future regarding any changes to this Privacy Statement.


Access and Control of Information

 

The individual may do the following at any time by contacting NEXUS via the email address or
phone number given on the NEXUS website:

    ● Change/correction of the information given.
    ● Deletion of the information given.
    ● Expression of any concern the individual has regarding the information given.

NEXUS may directly collect analytics data to help measure traffic and usage trends for the product microsites. Such shall not be manipulated to identify any particular individual user. Furthermore, log file information is automatically recorded each time the individual accesses the website.

In the event that NEXUS learns that it has collected personal information from a child under the age of 18 without verification of parental consent, NEXUS shall delete that information as quickly as possible.

 

Disclosure of Information

 

NEXUS shall disclose the individual’s information where required to do so by law or subpoena or if NEXUS reasonably believes that such action is necessary to (a) comply with the law and the reasonable requests of law enforcement; (b) to protect the security, quality or integrity of the NEXUS website; and/or (c) to exercise or protect the rights, property, or personal safety of other individuals.

In the event that any information under the control of NEXUS is compromised as a result of a breach of security, reasonable steps shall be taken to investigate the situation and where appropriate, notify those individuals whose information may have been compromised and take other steps, in accordance with any applicable laws and regulations.

 

Security

 

Security protection will cover online and offline protection. The information of the individual shall be encrypted in a secure manner. The computers/servers in which we store personally identifiable information are kept in a secure environment.

 

Cookies


Cookies are used on the NEXUS website, as well as the product microsites. A cookie is a piece of data stored on a site visitor's hard drive to help NEXUS identify repeat visitors on the website. Usage of a cookie is in no way linked to any personally identifiable information on NEXUS’ website.

 

Third Party Links

 

Links to other websites shall also be placed on the NEXUS website/product microsites. NEXUS shall not liable for the content of these other websites.

 

Acceptance of Terms and Consent of Individual

 

By providing the necessary information, the individual unconditionally agrees with Nexus’s Privacy Statement.

By submitting the data above, you acknowledge that Nexus may contact you regarding this inquiry. The personal data you provide will be handled in accordance with Nexus Privacy Policy. This site uses data collection tools, such as cookies, to personalize your experience and improve site performance. You consent to the use of cookies.

SUBMIT

LEARN HOW