Multi-Factor Authentication

Secure access to a wide range of systems, services and applications using adaptive cloud-based multi-factor authentication. Protect user accounts with more than just a password and reduce the impact of password reuse when the next large scale data breach happens.

Untouchable time to value

100% cloud-based back end, simplifying implementation and accelerating time to value for organizations of all sizes.

Frictionless user experience

Adaptive authentication delivers a frictionless user experience - intelligently challenging users only when risk is high.

Ease of deployment

Out-of-the-box support for a wide range of systems, services and applications including all major VPN vendors and cloud applications.

+ combine with other security products to unlock the power of ASE

Enable traditionally silo’d products to share and react to security events and state data whilst leveraging world class threat intelligence. Prevent attacks before they enter the kill chain.

What is ASE

Intelligent, adaptive, authentication

Passwords are not enough. Multi-Factor Authentication adds an additional layer of protection to user and privileged accounts – eliminating account compromise and identity related threats.

Stolen or weak passwords

Over 81% of data breaches start with a weak or stolen credential.

Insecure OTP delivery

Some OTPs sent by legacy solutions are susceptible to interception and vulnerable to phishing and MITM attacks.

Insider threat

Joiner Mover Leaver processes often result in ex-employees having access to systems and data long after they have left.

MFA Multi-Factor Authentication

Back to top Free Trial Contact us

How it works

Add an additional level of protection to user accounts above and beyond a simple password. Prevent unauthorized access in the event of password phishing, theft or brute force attack.

Features & Benefits

OTP Real-time session-specific One-Time Passcodes (OTPs)

Real-time generated OTPs provide improved security over predetermined time-based sequences.

Apps Wide Application Support

Supports a wide range of systems, services and applications including all major VPNs and cloud applications (via ADFS).

Delivery Automatic Delivery Failover

Supports OTP delivery via email, SMS, mobile app and Google Authenticator with failover between methods for high delivery assurance.

AD Integrated with AD

Fully integrated with Microsoft® Active Directory with the Censornet AD Connector software/service.

Deploy Ease of Deployment

Easy to install agents for on-premises services, which connect to a 100% cloud-based back end.

UX User Experience

Intuitive enrolment, easy to read MemoPasscodes™ and live status feedback showing OTP expiry.

Intuitive user interface

Screenshot Yellow Powered by IntelliTrust

Visual rule builder for MFA powered by IntelliTrust.

Screenshot Yellow MFA User View

At a glance user view showing individual status and group memberships.

Screenshot Yellow MFA Activity Report

Detailed authentication activity report.

Interested in finding out more?

Arrange a demo or read our technical datasheet.

Authentication Clients

What our customers say

Amey logo

“For our government customer, productivity has improved because users are logging in more often. It’s also improved the productivity of its IT team because users make far less support calls to the help desk because of the ease of use. And the solution has saved the customer money – the lower costs in buying and maintaining the product have helped make significant financial savings.”

David Barrie, IT Systems Manager

logo capsticks

“As a law firm, many of the cases we deal with are very sensitive, so the data we store is confidential. We were conscious that where our remote working environment was concerned, our security was only as good as the weakest password used by our employees. We needed to find a solution and quickly.”

Tim Bond, Head of IT

Our platform

Our cloud security platform integrates email and web security, CASB (Cloud Access Security Broker) and adaptive MFA (Multi-Factor Authentication) activating the Autonomous Security Engine (ASE) to take you beyond alert driven security and into real-time automated attack prevention.


Secure your entire organization from known, unknown & emerging email security threats - including email fraud.

Discover More_

Protect users from web-borne malware, offensive or inappropriate content & improve productivity.

Discover More_

Discover, analyze, secure & manage user interaction with cloud applications - inline & using APIs.

Discover More_

Reduce impact of large scale data breaches by protecting user accounts with more than just passwords.

Discover More_

Pioneering ASE technology

Autonomous Security Engine

Connecting your entire security product suite so it evolves and reacts automatically to a changing threat landscape.

Learn more about ASE
24x7 security

ASE provides 24x7 security so you don’t need to


Full access to threat intelligence without the cost


Integral part of the Censornet platform

Related insights

Red sweets

When the suite is not so sweet

In a world where the majority of data breaches start with weak or stolen credentials, many businesses have added an ...

Read More_
Password graphic

Why it’s time to ditch the password…

Given that passwords are on the front line of defence in the security of corporates and individuals, it’s mind boggling ...

Read More_
Laptop and phone graphic

NIST Digital Identity Guidelines – SMS in Authentication Strategies

As we anticipated when we first wrote about the Digital Identity Guidelines published by the National Institute of Standards and Technology ...

Read More_

Insights & Events