Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:48 PM
Dark Reading
Dark Reading
Products and Releases

VeriSign Extends VIP Network With MarkMonitor

VIP enables enterprises to strengthen typical username and password account access with an additional factor of authentication

MOUNTAIN VIEW, CA -- (Marketwire) -- November 23, 2009 -- VeriSign, Inc. (NASDAQ: VRSN) today announced that MarkMonitor', the global leader in enterprise brand protection, is strengthening the online authentication it offers to customers by joining the VeriSign' Identity Protection (VIP) Network.

As a VIP Network member, MarkMonitor can offer its customers strong, two-factor authentication whenever they log into the MarkMonitor site to manage their domains or hosted services. By going beyond standard log-ins, VIP authentication makes it harder for hackers and fraudsters to access customer account data and potentially inflict costly damage to a company's image, brand and bottom line.

Provided by VeriSign as a cloud-based authentication service, VIP enables enterprises to strengthen typical username and password account access with an additional factor of authentication using a unique one-time password (OTP) generated by a user's VIP security credential. Because logging on with two-factor authentication requires something the user knows (username and password) and something the user has (VIP credential), VIP has been proven effective against unauthorized access to online accounts and VPNs.

"Vigilance in defending our customers' brands and Internet presence requires remaining a step ahead of those who want to wrongly profit from a company's brand and online presence," said Frederick Felman, chief marketing officer at MarkMonitor. "Adding two-factor authentication provides another weapon to our security arsenal, and offers our customers an easy and convenient way to dramatically increase security. VIP offers strong, proven protection that is easily implemented, and we're excited we will be offering it."

By leveraging the cloud-based service, VIP makes it easy for companies to quickly deploy and scale strong authentication, which speeds time to market. Most importantly, VIP significantly reduces the cost and management barriers of implementing two-factor authentication, eliminating the need for additional capital investment and lowering the total cost of ownership (TCO).

"MarkMonitor helps companies battle the evolving threats to their brands and businesses, and implementing VIP to deter fraudulent activity is a key step in this ongoing fight," said Kerry Loftus, vice president of User Authentication at VeriSign. "By joining the VIP Network and deploying proven two-factor authentication, MarkMonitor will make it vastly more difficult for scammers to gain access to customer accounts. Businesses that understand the real cost of fraud protect their sites and their customers with VIP authentication."

VeriSign supports a wide range of security credentials that generate OTPs for strong authentication. In addition to traditional tokens and credit card-sized credentials, users can choose VIP Access for Mobile, a free, easy-to-install mobile application that transforms more than 200 different mobile devices into VIP authentication credentials. The application costs nothing for businesses to deploy and enables end users to enjoy two-factor authentication without carrying an extra credential.

To learn more about VeriSign Identity Protection, and for a free trial, please visit: http://www.verisign.com/authentication/vipfreetrial

About VeriSign

VeriSign, Inc. (NASDAQ: VRSN) is the trusted provider of Internet infrastructure services for the networked world. Billions of times each day, VeriSign helps companies and consumers all over the world engage in communications and commerce with confidence. Additional news and information about the company is available at www.verisign.com.

Statements in this announcement other than historical data and information constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements involve risks and uncertainties that could cause VeriSign's actual results to differ materially from those stated or implied by such forward-looking statements. The potential risks and uncertainties include, among others, the uncertainty of future revenue and profitability; potential fluctuations in quarterly operating results due to such factors as the risk that VeriSign's announcements may not result in additional products, services, customers, profits or revenues; and increased competition and pricing pressures. More information about potential factors that could affect the company's business and financial results is included in VeriSign's filings with the Securities and Exchange Commission, including in the company's Annual Report on Form 10-K for the year ended December 31, 2008 and quarterly reports on Form 10-Q. VeriSign undertakes no obligation to update any of the forward-looking statements after the date of this press release.

2009 VeriSign, Inc. All rights reserved. VeriSign, the VeriSign logo, the Checkmark Circle logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc., and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.

Contact Information: VeriSign Contacts:

Chris Halcon [email protected] 650-426-4417

Investor Relations: Nancy Fazioli [email protected] 650-426-5146

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...