Attacks/Breaches
9/6/2013
04:23 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

LaunchKey Introduces Anonymous User Authentication As Part Of Technology Platform

Multifactor authentication technology decentralizes credentials from personal identification information

LAS VEGAS, NV – September 5, 2013 – LaunchKey, a company that provides a secure approach to allow individuals to sign in or authenticate on websites, applications or networked systems through smartphones and tablets without passwords, today introduced anonymous user authentication capabilities as part of its technology platform that kills passwords.

The new multi-factor authentication technology architected by LaunchKey, which is also celebrating its first year in business, decentralizes credentials from personal identification information, further strengthening the privacy and security of enterprise organizations, developers and individuals alike. The company launched its private beta in May and its public beta in July.

"LaunchKey's technology will shift the way personal and corporate data are protected and secured and how proprietary information is accessed," said Zach Ware, CEO of Project 100 and VegasTechFund partner. "As logins and passwords quickly become obsolete, tools like LaunchKey will become the secure de facto solution for user authentication."

LaunchKey was discovered at Startup Weekend Las Vegas in July 2012, and investors and advisors have taken note. LaunchKey earned its first round of funding in December 2012. Co-founders Geoff Sanders, Yo Sub Kwon and Devin Egan are successful entrepreneurs who collectively have extensive experience in systems security, architecture and design and were recently named to Inc. Magazine's prestigious "30 Under 30" list of entrepreneurs for 2013.

"Passwords have become increasingly ineffective as their inherent weaknesses are exacerbated by a continual rise of computing power and diligence of hackers," said Sanders. "By moving away from this flawed authentication process, we provide users a safe and secure way to sign in and remove the burden and exposure presented when users have to remember a multitude of passwords -- many of which are tied to personal data."

LaunchKey Vision: Business Authentication Tool of Choice

According to market research, the multi-factor authentication market is expected to reach $5.45 billion by 2017. When a security breach or cyber attack occurs, it can cost companies upwards of hundreds of millions of dollars and jeopardizes personal and confidential information. Major enterprises and Fortune 500 companies are looking to LaunchKey to become their authentication tool of choice to access and protect company files, applications, websites and network infrastructure. LaunchKey's vision is to become a part of the daily lives of individuals, connecting them to critical information while providing enhanced security and ease of access.

"LaunchKey is the perfect example of what the Switch SUPERNAP sees as the integration of infrastructure, innovation and community pushing the envelope of what is possible to bring about change that shifts paradigms," said Rob Roy, CEO and founder of Switch SUPERNAP. "I couldn't be prouder of LaunchKey and the change they will make in my own world when passwords are eliminated. The world-class nature of their solutions speak volumes about the startups in Las Vegas."

The Benefits of Anonymous Architecture

Passwords are inherently insecure, so LaunchKey authenticates users to websites, applications and other networked systems by pushing authentication requests to a user's paired smartphone or tablet for physical authorization without requiring passwords. This system allows users to securely and privately authenticate without relinquishing personally identifiable information in the process.

The password-less authentication process combines the benefits of strong out-of-band authentication with the security of multiple authentication factors. LaunchKey's multi-factor authentication involves all three factors: possession (device factor), inherence (geofencing) and knowledge (combo and pin lock). When activated, all three must be used correctly together for authorization to be granted.

Personal identification remains anonymous and is not used in the authentication process -- a major advancement in the world of online security. LaunchKey ensures security while improving the ease and overall experience of authentication. Users can remotely manage their sessions from any of their smartphones and tablets, and simply log out with a swipe of a finger.

The LaunchKey application is available in Google Play and the App Store. The company's RESTful API is now in public beta with customized software development kits in the most common languages for both websites and native apps, plugins for popular content management systems including WordPress and Drupal, and support for popular protocols including OAuth and OpenID. LaunchKey is currently in the process of negotiating partnerships with leading technology providers.

For more information, visit www.launchkey.com.

About LaunchKey

LaunchKey is evolving user authentication and eliminating passwords with anonymous multi-factor authentication through smartphones and tablets. LaunchKey's free app enables users on websites, applications and other networked systems to securely and privately authenticate without passwords. For developers, LaunchKey provides a trustworthy alternative to password-based user authentication while reducing the liability passwords create. The founders were recently named to Inc. Magazine's prestigious "30 Under 30" list of entrepreneurs for 2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web