News
3/18/2014
03:28 PM
50%
50%

Milton Security Integrates Two-Factor Authentication With Cloud Authentication Security Applianc

Introduces both cloud-based and locally hosted two-factor authentication

FULLERTON, Calif., March 17, 2014 /PRNewswire/ -- Milton Security Group, Inc, the manufacturer of adaptive network security appliances and network management solutions, announced today that they have added an exciting new feature to their Cloud Authentication Security (CAS) solution.

Many organizations are looking for different ways to authenticate and track users on their network. Milton introduces two new features options with the addition of both a cloud-based two-factor authentication system, and a locally hosted two-factor authentication.

Any passwords or username, no matter how complex, can be cracked. The benefit of a two-factor authentication is that even if someone has your login information, they still need that second piece of the puzzle. This second piece is either something you have, like your mobile phone. DUO Security and WiKID Systems both offer two-factor authentication services, with individual twists. DUO Security is a cloud-based service, which requires very little set up. The ease of setup and configuration is painless. DUO is free for less than 10 users.

WiKID Systems is locally hosted at your premises, keeping your data and control local. The highly scalable, multi-tenant server is available as a software appliance or as Linux packages. It includes scripts to allow user-self registration in a secure manner, group functionality, RADIUS return attribute support, detailed logging and reporting. It also allows greater functionality, such as mutual SSL authentication and multiple tokens per user.

"Data breaches are rising at a startling rate and two-factor authentication has become an absolute must if you're serious about information security," states Milton CEO, James McMurry, "and Milton Security Group is striving to give customers as much control as possible."

Since the CAS solution now integrates with both DUO Security, and WiKID Systems, organizations can choose to further lock down their cloud authenticated networks using either cloud based or locally hosted two-factor systems.

Cloud Authentication Security (CAS) was introduced last week, along with its first integration: Google Apps for Education (GAFE). By using CAS, educational institutions can provide a single sign-on environment by integrating Google Apps For Education Authentication with either of the Adaptive Network Access Control appliances Milton Security manufactures (Edge7200 and ICEGuard). Now with the integration of Two Factor Authentication into CAS, all organizations, including Education, can fully secure their network, by ensuring credentials and endpoints are secure.

About Milton Security Group, Inc:

Milton Security Group Inc is the leader in providing adaptive granular endpoint security for all organizations. Unlike legacy platforms, Milton Security focuses on enabling and securing your systems, while dynamically enabling new technology requirements like BYOD and Cloud Security securely and efficiently. Milton Security Group is based in Fullerton, California, and is a privately held company. For more information, visitmiltonsecurity.com

About WiKID Systems

WiKID Systems, Inc., founded in 2001, is an Atlanta-based, self-funded and profitable technology company focused on helping companies and organizations reduce their dependence on passwords by making two-factor authentication simple and accessible, while allowing organizations to maintain control. For more information including pricing and documentation, please visit www.wikidsystems.com.

About DUO Security

Duo Security's hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo's unique, high-availability architecture provides centralized management, self-service enrollment, and interactive secondary login through an intuitive web interface, eliminating the high costs, complexity, and confusion associated with traditional two-factor systems. Duo Security is based in Ann Arbor, Michigan, and is a privately held company whose investors include Google Ventures, True Ventures, Resonant Venture Partners, and Radar Partners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?