News
3/18/2014
03:28 PM
50%
50%

Milton Security Integrates Two-Factor Authentication With Cloud Authentication Security Applianc

Introduces both cloud-based and locally hosted two-factor authentication

FULLERTON, Calif., March 17, 2014 /PRNewswire/ -- Milton Security Group, Inc, the manufacturer of adaptive network security appliances and network management solutions, announced today that they have added an exciting new feature to their Cloud Authentication Security (CAS) solution.

Many organizations are looking for different ways to authenticate and track users on their network. Milton introduces two new features options with the addition of both a cloud-based two-factor authentication system, and a locally hosted two-factor authentication.

Any passwords or username, no matter how complex, can be cracked. The benefit of a two-factor authentication is that even if someone has your login information, they still need that second piece of the puzzle. This second piece is either something you have, like your mobile phone. DUO Security and WiKID Systems both offer two-factor authentication services, with individual twists. DUO Security is a cloud-based service, which requires very little set up. The ease of setup and configuration is painless. DUO is free for less than 10 users.

WiKID Systems is locally hosted at your premises, keeping your data and control local. The highly scalable, multi-tenant server is available as a software appliance or as Linux packages. It includes scripts to allow user-self registration in a secure manner, group functionality, RADIUS return attribute support, detailed logging and reporting. It also allows greater functionality, such as mutual SSL authentication and multiple tokens per user.

"Data breaches are rising at a startling rate and two-factor authentication has become an absolute must if you're serious about information security," states Milton CEO, James McMurry, "and Milton Security Group is striving to give customers as much control as possible."

Since the CAS solution now integrates with both DUO Security, and WiKID Systems, organizations can choose to further lock down their cloud authenticated networks using either cloud based or locally hosted two-factor systems.

Cloud Authentication Security (CAS) was introduced last week, along with its first integration: Google Apps for Education (GAFE). By using CAS, educational institutions can provide a single sign-on environment by integrating Google Apps For Education Authentication with either of the Adaptive Network Access Control appliances Milton Security manufactures (Edge7200 and ICEGuard). Now with the integration of Two Factor Authentication into CAS, all organizations, including Education, can fully secure their network, by ensuring credentials and endpoints are secure.

About Milton Security Group, Inc:

Milton Security Group Inc is the leader in providing adaptive granular endpoint security for all organizations. Unlike legacy platforms, Milton Security focuses on enabling and securing your systems, while dynamically enabling new technology requirements like BYOD and Cloud Security securely and efficiently. Milton Security Group is based in Fullerton, California, and is a privately held company. For more information, visitmiltonsecurity.com

About WiKID Systems

WiKID Systems, Inc., founded in 2001, is an Atlanta-based, self-funded and profitable technology company focused on helping companies and organizations reduce their dependence on passwords by making two-factor authentication simple and accessible, while allowing organizations to maintain control. For more information including pricing and documentation, please visit www.wikidsystems.com.

About DUO Security

Duo Security's hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo's unique, high-availability architecture provides centralized management, self-service enrollment, and interactive secondary login through an intuitive web interface, eliminating the high costs, complexity, and confusion associated with traditional two-factor systems. Duo Security is based in Ann Arbor, Michigan, and is a privately held company whose investors include Google Ventures, True Ventures, Resonant Venture Partners, and Radar Partners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.