About Rublon
Use Cases and Deployment Scope
We use this authentication software to validate the identity when you log in to various pages or programs on the network. It can be used on computers or mobile devices. Additionally, you may receive a push notification before you are allowed to log in. Push notifications allow user authentication by sending a temporary message.
Pros
- It is recommended to introduce authentication software using a phased approach.
- This authentication software can also be used via the risk-based authentication approach.
Cons
- This mechanism certainly allows to protect a work site, but it can be expensive from an application point of view.
- It is unavoidable to precisely verify the user at the launch of the workstation and/or at the connection to its application using the measures of the security policy and also to show that the authentication procedure is correctly applied.
Most Important Features
- Each of the authentication methods has its own characteristics.
- Useful for managing a newcomer to work so that they have access only to what is necessary from the different elements.
Return on Investment
- Consequently, with an OTP system, the user has an expert forecaster who provides him with a password upon request.
- This password is valid for a limited duration, and for a single use.
Alternatives Considered
ABM Essentials, powered by Marketo Engage, Terminus ABM Platform and Atgen A2 Automation
Other Software Used
All Inclusive Marketing, Annex Cloud Referral Marketing Cloud, Amazon Marketing Cloud


