Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/16/2012
10:28 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comodo And TeleSign Partner To Deliver Intelligent Authentication

Announce joint layered security solution combining digital certificates and out-of-band phone-based authentication

Los Angeles, CA and Jersey City, NJ, May 15, 2012 – Comodo, a leading Internet security provider, and TeleSign, the market leader in Internet fraud prevention and Intelligent Authentication, announce their joint layered security solution combining the strengths of digital certificates and out-of-band phone-based authentication. The joint solution helps address the recently updated FFIEC Guidance, HIPAA, PCI, Sarbanes-Oxley, CJIS and serves other industries concerned with access management.

Two-Factor Authentication using out-of-band authentication and client certificates is easy to deploy, manage, and procure in any size institution. Several financial institutions have already replaced knowledge-based authentication such as challenge questions, in favor of the joint solution that affords their internal users and customers a better user experience and improved security.

"The joint solution delivers true two factor compliance that is seamless and requires no business-side integration," said Andrew Pynes, VP Enterprise Solutions, Comodo. "It is simple to configure, fast to deploy, and affordable."

"Our partnership with Comodo offers a single solution for customers seeking quick and effective layered security with the leading providers of digital certificates and two-factor authentication," said Dan Takahashi, Director of Business Development, TeleSign.

Already deployed by businesses of all sizes throughout the world, Comodo TF has been seamlessly integrated with TeleSign phone-based Two-Factor Authentication and will continue to work without the need for modifications or IT resources.

About Comodo

Comodo® is a leading brand in Internet security. With US Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security and trust services, including digital certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for over 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: www.comodo.com .

About TeleSign

Every second, of every day, TeleSign protects the world's largest Internet and Cloud properties against fraud. TeleSign Intelligent Authentication provides an easy-to-implement and powerful method for identifying and substantially reducing online fraud and spam using the most widely deployed technology — a user's phone. The company protects 2.5 billion downstream users in more than 200 countries, offering localization services in 87 languages. In 2011, TeleSign ranked #15 on the Deloitte Technology Fast 500™ and was named Visionary in Gartner's User Authentication Magic Quadrant.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
GR8Day
50%
50%
GR8Day,
User Rank: Apprentice
5/17/2012 | 5:02:31 PM
re: Comodo And TeleSign Partner To Deliver Intelligent Authentication
-I have multiple accounts online and only feel secure if I telesign into them. This gives me the confidence that my account won't get hijacked and my credit card information isn't up for grabs.
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22861
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted ...
CVE-2021-22862
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of ...
CVE-2021-22863
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would b...
CVE-2020-10519
PUBLISHED: 2021-03-03
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the Gi...
CVE-2021-21353
PUBLISHED: 2021-03-03
Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was p...