04:04 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

SecureAuth Launches 2Factor As A Service Solution

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs

IRVINE, Calif., Dec. 12, 2013 - SecureAuth, a leading provider of corporate 2-Factor Access Control, today launched SecureAuth 2-Factor as a Service (2FaaS), a completely cloud-hosted authentication solution that offers flexible security without compromising the user experience or information. SecureAuth 2FaaS delivers flexible authentication options while maintaining user credentials on-premise. The patent-pending Device Fingerprinting mechanism avoids placing a thick client or an insecure cookie on users' devices making SecureAuth 2FaaS ideal for enterprise-wide, B2C, and OEM integration.

"SecureAuth 2-Factor as a Service is an intelligent authentication solution that has taken a heuristics-based fingerprint of the device and become transparent to the user to give them access to web, mobile, and cloud resources," said Garret Grajek, Chief Technology Officer at SecureAuth. "Two-factor authentication can be as easy or demanding as enterprise policies dictate, and can be required for all users or only specific users like customers or contractors. We developed SecureAuth 2FaaS to be flexible and convenient to meet the varying needs of enterprises who have BYOD and desktop users, and for OEMs that prefer our codeless capability."

SecureAuth 2FaaS Optimum User Experience

SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. It can be deployed for any corporate web application, including Microsoft OWA, SharePoint, and IBM WebSphere; and enterprise mobile application, including Android, Apple and iOS apps. By being compatible with any device, employees, partners, contractors, and customers can easily accesses sensitive data in a secure manner.

Flexible Administrator Console

SecureAuth 2FaaS is completely cloud-based, yet no user information or password credentials are ever stored with SecureAuth or in the cloud. IT administrators have confidence that their corporate identities remain on-premise and they retain user credentials. SecureAuth 2FaaS is self-provisioning, resulting in no help desk required for revoking or managing access to corporate resources.

A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations. This makes integration into their applications and deployment across the enterprise easy and fast.

Organizations interested in learning more about SecureAuth 2FaaS can attend today's webinar, visit the SecureAuth blog, or contact a representative.

About SecureAuth

Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web