Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/28/2010
12:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hitachi ID Systems Releases Password Manager 7.0

Authentication management solution has connectors to both on-premise and cloud-based applications

Calgary, Canada -- July 28, 2010 -- Hitachi ID Systems, Inc., a leading provider of identity and access management solutions (www.Hitachi-ID.com), has released Password Manager 7.0, the market's first true authentication management platform, able to manage any and every authentication factor employed by a corporate user.

Hitachi ID Password Manager (formerly P-Synch) 7.0 is a major retooling of the application that provides stronger security, better scalability, enhanced user adoption and improved ROI. It leverages Hitachi ID Systems' latest identity management technology platform, with a SQL Server or Oracle back-end, a real-time data replication service, high performance data updates via stored procedures and Unicode support.

Password Manager 7.0 is the first release where telephone-based password and PIN reset (Hitachi ID Telephone Password Manager) and enterprise single sign-on (Hitachi ID Login Manager) are included in the base product and price.

“Password Manager 7.0 was designed from the ground up to be the most advanced platform for managing authentication factors,” said Idan Shoham, Hitachi ID Systems CTO. “We used our next-generation technology platform to get the best possible scalability, flexibility and reliability. We then added capabilities to support one-stop management of all of a user's authentication factors -- passwords, security questions, OTP tokens, smart cards, voice biometrics, hard disk encryption keys and more.”

Password Manager 7.0 introduces a series of significant new features:

  • Authentication chains, supporting context-sensitive and multi-step processes for validating user identity. Examples include: o Protecting Extranet-facing deployments against attack by robots using CAPTCHAs. o Leveraging mobile phones as an authentication factor. o Integrating with consumer authentication services from vendors such as VeriSign or RSA.
  • User classes for flexible delegation of security rights. Examples include: o Regional help desks with local authority to reset passwords. o Empowering managers to reset passwords for their (direct or indirect) subordinates.

  • A password synchronization service on Windows servers, which minimizes the code running in the operating system kernel and supports advanced features such as user filtering and a retry queue.

  • Enhancements to the managed user enrollment system, enabling large organizations to control the pace at which users are invited to complete their profiles.

  • Many new reports to track user profiles and login accounts, orphan and dormant accounts, enrollment progress and more.

  • Official support for Windows 7 clients, including 64-bit versions.

    Password Manager ships with connectors for over 100 types of systems and applications including common on-premises systems such as Active Directory and SAP and cloud-hosted systems such as Google Applications and WebEx. It also includes integrations with the Windows login process, 10 types of help desk incident management applications, e-mail systems, full disk encryption products and more.

    About Hitachi ID Systems, Inc. Hitachi ID Systems, Inc. is a leading provider of identity management solutions. Hitachi ID Management Suite has been licensed by hundreds of mid- to large-sized organizations worldwide. Hitachi ID Systems' solutions enable organizations to effectively manage every aspect of the user lifecycle. Hitachi ID Management Suite includes Hitachi ID Identity Manager, Password Manager and Hitachi ID Privileged Password Manager.

    For more information about Hitachi ID Systems, Inc. and its products, please visit the corporate web site at Hitachi-ID.com, the product web sites at Hitachi-ID.com, the product web sites at Identity-Manager.Hitachi-ID.com, Password-Manager.Hitachi-ID.com, Privileged-Password-Manager.Hitachi-ID.com, or call 1.403.233.0740.

    Hitachi ID Systems, Inc. contact:

    Dawn Mallyon VP Marketing Hitachi ID Systems, Inc. 500, 1401 1st Street S.E Calgary, AB T2G 2J3 1.403.233.0740 ext. 324 [email protected]

    Media and analysts please contact:

    Leo Valiquette inmedia Public Relations Mobile: +1 613 769 9479 [email protected]

    Alayne Martell inmedia Public Relations Mobile: +1 902 308 1067 [email protected]

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Manchester United Suffers Cyberattack
    Dark Reading Staff 11/23/2020
    As 'Anywhere Work' Evolves, Security Will Be Key Challenge
    Robert Lemos, Contributing Writer,  11/23/2020
    Cloud Security Startup Lightspin Emerges From Stealth
    Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-27218
    PUBLISHED: 2020-11-28
    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
    CVE-2020-29367
    PUBLISHED: 2020-11-27
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    CVE-2020-26245
    PUBLISHED: 2020-11-27
    npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
    CVE-2017-15682
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
    CVE-2017-15683
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.