Secure passwords

Maytech products allow you to insist upon the strongest, un-hackable passwords when adding users across your organisation. You can set rules that enforce colleagues and connections to only create strong passwords – keeping your networks safe.

You can stipulate:

  • Length
  • Letter combinations
  • Characters and numbers
  • Password expiry dates
2FA image

Two-factor authentication (2FA) file sharing

Two-factor encryption (2FA or FTA) from Google Authenticator is an additional module with Maytech products that allows you to add even more security to your file transfer.

Our two-factor authentication products add a second layer of security to your online file sharing. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.

Maytech’s 2-Factor Authentication solutions mean that administrators can elect to have their 2FA codes sent in one of two ways:

Google Authenticator:

Google Authenticator implements security tokens from a mobile app. Google Authenticator provides a 6 digit, one time password which users must enter alongside their username and password every time they log in to their account.

SMS:

During login an SMS is sent to the users designated phone number with a one-time use code which is 6 digits long. This code must be entered as well as the user name and password during login to their account.

Talk to our team

Do you want to implement two-factor file sharing? Contact our sales team to add the 2FA transfer module to your account or download the data sheet for more information.

Our products

Quatrix
Secure and compliant solution for sharing sensitive data
Find out more
Quatrix China
Fast and reliable transfers for files of any size into and out of China
Find out more
Quatrix Vault
Tokenization API for secure, remote storage of PCI customer data
Find out more
Quatrix Vault
Managed cloud archive for long term storage and infrequent retrieval
Find out more

Can we help with Secure File Sharing requirements?

Secure your data transfers with Quatrix

Try it free Book demo
7 Key Principles to Control and Secure your External File Sharing Download guide