04:04 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

SecureAuth Launches 2Factor As A Service Solution

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs

IRVINE, Calif., Dec. 12, 2013 - SecureAuth, a leading provider of corporate 2-Factor Access Control, today launched SecureAuth 2-Factor as a Service (2FaaS), a completely cloud-hosted authentication solution that offers flexible security without compromising the user experience or information. SecureAuth 2FaaS delivers flexible authentication options while maintaining user credentials on-premise. The patent-pending Device Fingerprinting mechanism avoids placing a thick client or an insecure cookie on users' devices making SecureAuth 2FaaS ideal for enterprise-wide, B2C, and OEM integration.

"SecureAuth 2-Factor as a Service is an intelligent authentication solution that has taken a heuristics-based fingerprint of the device and become transparent to the user to give them access to web, mobile, and cloud resources," said Garret Grajek, Chief Technology Officer at SecureAuth. "Two-factor authentication can be as easy or demanding as enterprise policies dictate, and can be required for all users or only specific users like customers or contractors. We developed SecureAuth 2FaaS to be flexible and convenient to meet the varying needs of enterprises who have BYOD and desktop users, and for OEMs that prefer our codeless capability."

SecureAuth 2FaaS Optimum User Experience

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. It can be deployed for any corporate web application, including Microsoft OWA, SharePoint, and IBM WebSphere; and enterprise mobile application, including Android, Apple and iOS apps. By being compatible with any device, employees, partners, contractors, and customers can easily accesses sensitive data in a secure manner.

Flexible Administrator Console

SecureAuth 2FaaS is completely cloud-based, yet no user information or password credentials are ever stored with SecureAuth or in the cloud. IT administrators have confidence that their corporate identities remain on-premise and they retain user credentials. SecureAuth 2FaaS is self-provisioning, resulting in no help desk required for revoking or managing access to corporate resources.

A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations. This makes integration into their applications and deployment across the enterprise easy and fast.

Organizations interested in learning more about SecureAuth 2FaaS can attend today's webinar, visit the SecureAuth blog, or contact a representative.

About SecureAuth

Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Latest Comment: LOL.
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web