News
3/18/2014
03:28 PM
Connect Directly
RSS
E-Mail
50%
50%

Milton Security Integrates Two-Factor Authentication With Cloud Authentication Security Applianc

Introduces both cloud-based and locally hosted two-factor authentication

FULLERTON, Calif., March 17, 2014 /PRNewswire/ -- Milton Security Group, Inc, the manufacturer of adaptive network security appliances and network management solutions, announced today that they have added an exciting new feature to their Cloud Authentication Security (CAS) solution.

Many organizations are looking for different ways to authenticate and track users on their network. Milton introduces two new features options with the addition of both a cloud-based two-factor authentication system, and a locally hosted two-factor authentication.

Any passwords or username, no matter how complex, can be cracked. The benefit of a two-factor authentication is that even if someone has your login information, they still need that second piece of the puzzle. This second piece is either something you have, like your mobile phone. DUO Security and WiKID Systems both offer two-factor authentication services, with individual twists. DUO Security is a cloud-based service, which requires very little set up. The ease of setup and configuration is painless. DUO is free for less than 10 users.

WiKID Systems is locally hosted at your premises, keeping your data and control local. The highly scalable, multi-tenant server is available as a software appliance or as Linux packages. It includes scripts to allow user-self registration in a secure manner, group functionality, RADIUS return attribute support, detailed logging and reporting. It also allows greater functionality, such as mutual SSL authentication and multiple tokens per user.

"Data breaches are rising at a startling rate and two-factor authentication has become an absolute must if you're serious about information security," states Milton CEO, James McMurry, "and Milton Security Group is striving to give customers as much control as possible."

Since the CAS solution now integrates with both DUO Security, and WiKID Systems, organizations can choose to further lock down their cloud authenticated networks using either cloud based or locally hosted two-factor systems.

Cloud Authentication Security (CAS) was introduced last week, along with its first integration: Google Apps for Education (GAFE). By using CAS, educational institutions can provide a single sign-on environment by integrating Google Apps For Education Authentication with either of the Adaptive Network Access Control appliances Milton Security manufactures (Edge7200 and ICEGuard). Now with the integration of Two Factor Authentication into CAS, all organizations, including Education, can fully secure their network, by ensuring credentials and endpoints are secure.

About Milton Security Group, Inc:

Milton Security Group Inc is the leader in providing adaptive granular endpoint security for all organizations. Unlike legacy platforms, Milton Security focuses on enabling and securing your systems, while dynamically enabling new technology requirements like BYOD and Cloud Security securely and efficiently. Milton Security Group is based in Fullerton, California, and is a privately held company. For more information, visitmiltonsecurity.com

About WiKID Systems

WiKID Systems, Inc., founded in 2001, is an Atlanta-based, self-funded and profitable technology company focused on helping companies and organizations reduce their dependence on passwords by making two-factor authentication simple and accessible, while allowing organizations to maintain control. For more information including pricing and documentation, please visit www.wikidsystems.com.

About DUO Security

Duo Security's hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo's unique, high-availability architecture provides centralized management, self-service enrollment, and interactive secondary login through an intuitive web interface, eliminating the high costs, complexity, and confusion associated with traditional two-factor systems. Duo Security is based in Ann Arbor, Michigan, and is a privately held company whose investors include Google Ventures, True Ventures, Resonant Venture Partners, and Radar Partners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio