The software installation was automated and provided a post-load configuration wizard. The only system requirements for the load was Java Runtime Environment (JRE) support. We were up and running within minutes.
The provisioning of an X.509 client certificate onto the end-user's machine was handled through a simple standard logon procedure. This certificate was installed into the certificate store of our Internet Explorer browser. Digital certificates are easy to deploy and install on client devices. That certificate will be requested and verified every time we log into the proxy server and will authenticate us to the application we chose to access.
Since this used a proxy-based authentication solution, it can be deployed very quickly. No modifications are required to the applications that this solution would front end, and the automated issuance and management of the digital certificates was simple to use.
There was a provision for using a USB device to store the digital certificate. This would add extra security. The base configuration that most people would use, however, relies on storing that certificate in the browser's certificate store on the device itself. Although this adds the protection at the remote end, the cert would be available to anyone that could compromise the device where it is is stored.
Comodo Two-Factor Authentication is an easy-to-use solution that will not require a lot of IT resources to deploy or support. It provides an added level of security as long as you understand the risk.