Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:13 PM

Aladdin Introduces Clientless Smartcard Authentication Solution For Online Services

Aladdin eToken PRO Anywhere combines certificate-based authentication with plug-and-play simplicity

BALTIMORE --(Business Wire)-- Apr 21, 2009 Aladdin Knowledge Systems, a global leader in information security and affiliated under common management with SafeNet, Inc., today announced the availability of Aladdin eToken PRO Anywhere, the first smartcard-based strong authentication solution to combine the security of certificate-based technology with plug-and-play simplicity for end-users. The latest innovation in smartcard authentication, the clientless Aladdin eToken device enables remote access with strong, two-factor authentication from any computer with an Internet connection and USB port.

eToken PRO Anywhere enhances business value for organizations who need to provide customers, partners and internal users with secure remote access to Web-based services on a platform that is intuitive and easy to use. A clientless device, eToken PRO Anywhere eliminates the need to install end-point software for remote access, providing a seamless, simple user experience that enables secure access to sensitive data, applications and services easily from any location. It is especially suited for industries that require advanced security for private and corporate data including finance, government, law enforcement, healthcare and eCommerce.

"Aladdin eToken PRO Anywhere represents the future of authentication for organizations that need to provide strong, certificate-based authentication with an intuitive user experience," said Shlomi Yanai, vice president of the Authentication Business Unit at Aladdin Knowledge Systems. "Organizations are constantly searching for ways to enable new online business opportunities, prevent fraud and cybercrime and comply with regulations, while still serving the needs of their end-users. With eToken PRO Anywhere, organizations can enable secure access to online digital information while delivering simplicity for their users that has never before been available in certificate-based solution."

eToken PRO Anywhere combines the full functionality of a smartcard-based authentication device, including on-board credentials and digital signature capabilities, with the plug-and-play portability of a One-Time-Password authenticator. eToken PRO Anywhere devices require no maintenance and never expire.

Like all Aladdin smartcard chips, the eToken PRO Anywhere smartcard is Common Criteria certified and the device is in the process of certification for FIPS 140-2 level 2 and 3.

For a live demo of eToken PRO Anywhere during RSA Conference 2009, visit the SafeNet booth #2325 or contact Cheryl Barto at [email protected] or by phone at 630-415-8310 to schedule an appointment.

About SafeNet and Aladdin Knowledge Systems

In 2007, SafeNet was acquired by Vector Capital, a $2 billion private equity firm specializing in the technology sector. Vector Capital acquired Aladdin in March of 2009, and placed it under common management with SafeNet. Together, these global leading companies are the third largest information security company in the world, which brings to market integrated solutions required to solve customers' increasing security challenges. SafeNet's encryption technology solutions protect communications, intellectual property and digital identities for enterprises and government organizations. Aladdin's software protection, licensing and authentication solutions protect companies' information, assets and employees from piracy and fraud. Together, SafeNet and Aladdin have a combined history of more than 50 years of security expertise in more than 100 countries around the globe. Aladdin is expected to be fully integrated into SafeNet in the future. For more information, visit www.safenet-inc.com or www.aladdin.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.