04:23 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

LaunchKey Introduces Anonymous User Authentication As Part Of Technology Platform

Multifactor authentication technology decentralizes credentials from personal identification information

LAS VEGAS, NV – September 5, 2013 – LaunchKey, a company that provides a secure approach to allow individuals to sign in or authenticate on websites, applications or networked systems through smartphones and tablets without passwords, today introduced anonymous user authentication capabilities as part of its technology platform that kills passwords.

The new multi-factor authentication technology architected by LaunchKey, which is also celebrating its first year in business, decentralizes credentials from personal identification information, further strengthening the privacy and security of enterprise organizations, developers and individuals alike. The company launched its private beta in May and its public beta in July.

"LaunchKey's technology will shift the way personal and corporate data are protected and secured and how proprietary information is accessed," said Zach Ware, CEO of Project 100 and VegasTechFund partner. "As logins and passwords quickly become obsolete, tools like LaunchKey will become the secure de facto solution for user authentication."

LaunchKey was discovered at Startup Weekend Las Vegas in July 2012, and investors and advisors have taken note. LaunchKey earned its first round of funding in December 2012. Co-founders Geoff Sanders, Yo Sub Kwon and Devin Egan are successful entrepreneurs who collectively have extensive experience in systems security, architecture and design and were recently named to Inc. Magazine's prestigious "30 Under 30" list of entrepreneurs for 2013.

"Passwords have become increasingly ineffective as their inherent weaknesses are exacerbated by a continual rise of computing power and diligence of hackers," said Sanders. "By moving away from this flawed authentication process, we provide users a safe and secure way to sign in and remove the burden and exposure presented when users have to remember a multitude of passwords -- many of which are tied to personal data."

LaunchKey Vision: Business Authentication Tool of Choice

According to market research, the multi-factor authentication market is expected to reach $5.45 billion by 2017. When a security breach or cyber attack occurs, it can cost companies upwards of hundreds of millions of dollars and jeopardizes personal and confidential information. Major enterprises and Fortune 500 companies are looking to LaunchKey to become their authentication tool of choice to access and protect company files, applications, websites and network infrastructure. LaunchKey's vision is to become a part of the daily lives of individuals, connecting them to critical information while providing enhanced security and ease of access.

"LaunchKey is the perfect example of what the Switch SUPERNAP sees as the integration of infrastructure, innovation and community pushing the envelope of what is possible to bring about change that shifts paradigms," said Rob Roy, CEO and founder of Switch SUPERNAP. "I couldn't be prouder of LaunchKey and the change they will make in my own world when passwords are eliminated. The world-class nature of their solutions speak volumes about the startups in Las Vegas."

The Benefits of Anonymous Architecture

Passwords are inherently insecure, so LaunchKey authenticates users to websites, applications and other networked systems by pushing authentication requests to a user's paired smartphone or tablet for physical authorization without requiring passwords. This system allows users to securely and privately authenticate without relinquishing personally identifiable information in the process.

The password-less authentication process combines the benefits of strong out-of-band authentication with the security of multiple authentication factors. LaunchKey's multi-factor authentication involves all three factors: possession (device factor), inherence (geofencing) and knowledge (combo and pin lock). When activated, all three must be used correctly together for authorization to be granted.

Personal identification remains anonymous and is not used in the authentication process -- a major advancement in the world of online security. LaunchKey ensures security while improving the ease and overall experience of authentication. Users can remotely manage their sessions from any of their smartphones and tablets, and simply log out with a swipe of a finger.

The LaunchKey application is available in Google Play and the App Store. The company's RESTful API is now in public beta with customized software development kits in the most common languages for both websites and native apps, plugins for popular content management systems including WordPress and Drupal, and support for popular protocols including OAuth and OpenID. LaunchKey is currently in the process of negotiating partnerships with leading technology providers.

For more information, visit

About LaunchKey

LaunchKey is evolving user authentication and eliminating passwords with anonymous multi-factor authentication through smartphones and tablets. LaunchKey's free app enables users on websites, applications and other networked systems to securely and privately authenticate without passwords. For developers, LaunchKey provides a trustworthy alternative to password-based user authentication while reducing the liability passwords create. The founders were recently named to Inc. Magazine's prestigious "30 Under 30" list of entrepreneurs for 2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Published: 2014-10-21
Cross-site scripting (XSS) vulnerability in includes/api_tenpay/inc.tenpay_notify.php in the Alipay plugin 3.6.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via vectors related to the getDebugInfo function.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.