04:04 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

SecureAuth Launches 2Factor As A Service Solution

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs

IRVINE, Calif., Dec. 12, 2013 - SecureAuth, a leading provider of corporate 2-Factor Access Control, today launched SecureAuth 2-Factor as a Service (2FaaS), a completely cloud-hosted authentication solution that offers flexible security without compromising the user experience or information. SecureAuth 2FaaS delivers flexible authentication options while maintaining user credentials on-premise. The patent-pending Device Fingerprinting mechanism avoids placing a thick client or an insecure cookie on users' devices making SecureAuth 2FaaS ideal for enterprise-wide, B2C, and OEM integration.

"SecureAuth 2-Factor as a Service is an intelligent authentication solution that has taken a heuristics-based fingerprint of the device and become transparent to the user to give them access to web, mobile, and cloud resources," said Garret Grajek, Chief Technology Officer at SecureAuth. "Two-factor authentication can be as easy or demanding as enterprise policies dictate, and can be required for all users or only specific users like customers or contractors. We developed SecureAuth 2FaaS to be flexible and convenient to meet the varying needs of enterprises who have BYOD and desktop users, and for OEMs that prefer our codeless capability."

SecureAuth 2FaaS Optimum User Experience

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. It can be deployed for any corporate web application, including Microsoft OWA, SharePoint, and IBM WebSphere; and enterprise mobile application, including Android, Apple and iOS apps. By being compatible with any device, employees, partners, contractors, and customers can easily accesses sensitive data in a secure manner.

Flexible Administrator Console

SecureAuth 2FaaS is completely cloud-based, yet no user information or password credentials are ever stored with SecureAuth or in the cloud. IT administrators have confidence that their corporate identities remain on-premise and they retain user credentials. SecureAuth 2FaaS is self-provisioning, resulting in no help desk required for revoking or managing access to corporate resources.

A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations. This makes integration into their applications and deployment across the enterprise easy and fast.

Organizations interested in learning more about SecureAuth 2FaaS can attend today's webinar, visit the SecureAuth blog, or contact a representative.

About SecureAuth

Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web