Authentication from many different sources

TAC doesn’t restrict you to one authentication repository. You can have multiple ways to validate an end user, and these methods can be combined together to make a much more certain way of distinguishing your users from would-be imposters. For example, you can combine Active Directory username and password with hardware device credentials, certificates, smartcards or even biometric authentication.

Take These Deals Home For Christmas

We’re spreading some Christmas cheer across our entire range. Get up to 50% off selected items - sale ends Friday.