About 35,800 results
Open links in new tab
  1. AuthPoint Identity Security and MFA Solutions | WatchGuard

    AuthPoint Identity Security provides the security you need to protect identities, assets, accounts, and information. Let your company work confidently and worry-free with easy-to-use, cost-effective, and …

  2. Cloud-Based Network Authentication Services | WatchGuard

    WatchGuard’s ecosystem includes over one hundred third-party integrations with AuthPoint. It supports deployment with any business so users can verify their identity before accessing sensitive Cloud …

  3. About AuthPoint - WatchGuard Technologies

    To use AuthPoint, you must activate an AuthPoint license in your WatchGuard account. The AuthPoint license determines the number of users you can configure to use AuthPoint for multi-factor …

  4. Quick Start — Set Up AuthPoint - WatchGuard Technologies

    This topic describes the general steps to configure and test multi-factor authentication (MFA) with AuthPoint. This guide introduces AuthPoint, reviews the basic components of AuthPoint, and helps …

  5. AuthPoint for End-Users - WatchGuard Technologies

    To get started, download and install the WatchGuard AuthPoint mobile app on your mobile device. When your administrator deploys AuthPoint, you receive an activation email with a link that is used to …

  6. AuthPoint 30-Day Free Trial | WatchGuard Free AuthPoint

    AuthPoint includes our award-winning multi-factor authentication (MFA), compatible with Windows and macOS, with online and offline verification methods. Plus, it offers MFA-protected access to …

  7. Identity Security Management & Visibility

    As part of the AuthPoint Total Identity Security package, users can access dark web monitoring, which integrates with WatchGuard Cloud for centralized management.

  8. AuthPoint Total Identity Security | WatchGuard

    Multi-factor Authentication protects against attacks using compromised passwords. Try AuthPoint free today.

  9. AuthPoint Downloads - WatchGuard Technologies

    This topic describes how to download the various AuthPoint components and agents.

  10. AuthPoint Hardware Tokens Don’t Expose Data

    The authentication process using AuthPoint hardware tokens is Cloud-based, ensuring that sensitive data is not exposed. Seed files are created in a secure network that is isolated from the Internet.