Search Results:
×IP Restriction Solution allows administrators or organization owners to limit access of their business data to only a specified and registered IP addresses range.
Once an IP restriction solution is enabled, Admins can specify which IP addresses have access to login into the employees’ accounts using IP restriction/limitations. If a user tries to log in outside the required range, it’ll throw an error and a specific employee/ user won’t be unable to login and access the info. Thus, Enabling IP restrictions ensures that your important data can’t be accessed at an unsecured public place or through an unregistered IP address.
There are 2 types of IP Addresses:
For corporate purposes, static IP addresses are suggested. This is because Dynamic IP keeps changing every time users login, and hence the admin needs to update the Ip addresses range/pool on a regular basis which is a repetitive tedious task.
When a user tries to login/access their account, the IP address of the login request is evaluated against the allow list by the IP Restriction solution. If the IP address is not on the list, the portal denies login request.
Administrators can choose one of the following actions depending on the IP address range of the requesting IP :
Allow access to a portal/data if requesting IP belongs to specified IP Addresses range.
Prompt user for 2FA (Challenging user login request to confirm user).
Deny access to a portal/data if Requesting IP does not belongs to specified IP Addresses range.
per user per month
*Please contact us to get volume discounts for higher user tiers.
By restricting access to specific IP addresses, you can enhance the security of your sensitive data and resources.
Implementing IP address restrictions can help reduce costs associated with managing access control.
IP address restrictions can help improve the performance of your network by reducing the amount of traffic allowed to access it.
Our IP Restriction solution can be used on any device supporting a web browser. The users are not required to install any additional software on their devices.
An advanced level of authentication with two or more levels of security factors such as OTP over SMS, TOTP tokens, OTP over Email, hardware tokens etc.
Restrict the number of devices the users can access the services on, Geo-location, IP restriction, time of login, etc.
It provides an additional layer of MFA security based on risk and access provided by the security admin to control user access.
Our Other Identity & Access Management Products