[Webinar] OTP Authenticators: NFC, Voice-Enabled 2FA, and TOTP/HOTP function in FIDO Security Keys

Wed 3 Nov 2021
Home 9 Identity & Authentication 9 [Webinar] OTP Authenticators: NFC, Voice-Enabled 2FA, and TOTP/HOTP function in FIDO Security Keys

OTP Authenticators: NFC, Voice-enabled 2FA, & TOTP/HOTP function for FIDO security keys

Let’s deep dive into another authentication method FEITIAN is known for; OTP TokensTime: Nov 4, 2021 01:00 | PM Pacific Time (US and Canada)

Save your seat

What you will learn

OATH compliant OTP standards

Discussion about MFA and OATH’s event-based OTP [HOTP] and time-based OTP [TOTP] authentication standards

FEITIAN’s OTP token portfolio
  • Single Button OTP Tokens, with optional NFC capability!
  • OTP cards (2 sizes)
    C300 OTP Token, with optional voice-enabled capability!
  • C610 OTP Token with a QR code scanner
  • FIDO key with built-in OTP config slot 1 & 2
Demo #1

Various OTP tokens and various IdPs

Demo #2

3 ways to programming OTP tokens, seed file format, and management

Live Q&A

Enrique will be available to answer any questions asked during the live webinar.

Why you should Join?

There are many ways to secure and protect your digital life, and FEITIAN Technologies is the best for diverse and multiple authentication capabilities. Let’s deep dive into another authentication method that FEITIAN Technologies is known for – OTP Tokens.

  • OATH compliant OTP standards

    Talk about MFA and OATH’s HOTP and TOTP authentication standards

  • FEITIAN’s OTP token portfolio

    • Single Button OTP Tokens, with optional NFC capability!
    • OTP cards (2 sizes)
    • C300 OTP Token, with optional voice-enabled capability!
    • C610 OTP Token with a QR code scanner
    • FIDO key with built-in OTP config slot 1 & 2
  • Live Demo #1

    Various OTP tokens and various IdPs

  • Live demo #2

    3 ways to programming OTP tokens, seed file format, and management

  • Live Q&A.

    Enrique will be available to answer any questions asked during the live webinar

Join the webinar

Register Now

Related Posts

Empowering Government Agencies with PIV & CAC Sign-ins

Empowering Government Agencies with PIV & CAC Sign-ins

Government agencies require efficient and secure access to critical applications and data, ...
Understanding the Escalating Critical Infrastructure Digital Threat Landscape

Understanding the Escalating Critical Infrastructure Digital Threat Landscape

In recent years, the cybersecurity landscape has undergone significant transformation, with ...
Unlocking Next-Level Security: Transitioning from OTP to FIDO Keys

Unlocking Next-Level Security: Transitioning from OTP to FIDO Keys

Safeguarding sensitive data has never been more critical, yet relying solely on traditional ...
Enterprise Security

Stay in the know

Join our community of security-conscious individuals and organizations who prioritize safeguarding their sensitive data. Stay informed about the latest advancements in cyber-physical technology and discover how FEITIAN can empower you to take control of your digital security.

"*" indicates required fields

Full Name*
Share This