SecureAuth Launches "Fingerprint" Authentication For BYOD Security
SecureAuth IdP 7.0 uses an heuristics approach to identify, authenticate, and assert access to mobile devices and apps
May 22, 2013
PRESS RELEASE
IRVINE, Calif., May 21, 2013 – SecureAuth, a leading provider of identity enforcement technology for the enterprise, today launched SecureAuth IdP 7.0, an identity access management software that uses an heuristics approach to identify, authenticate and assert access to mobile devices and apps. SecureAuth IdP 7.0 addresses organizations' need for stronger mobile security when managing the growing number of bring your own devices (BYOD) and simplifies the login and access process for employees who use multiple devices at work including desktops, tablets and smartphones. SecureAuth IdP recently won an independent enterprise authentication test conducted by Network World and was noted as "best in breed" by editors. SecureAuth will demonstrate the solution at CTIA 2013 booth 4020.
Phillip Redman, VP distinguished analyst at Gartner research firm stated, "Bring your own device is adding complexity to IT departments, including assessing the need for additional endpoint data protection and backup capabilities. IT managers must develop and deploy policies to ensure data security without compromising user productivity."
SecureAuth IdP 7.0 uses up to 14 different authentication options, such as variations to HTTP headers, IP address, browser specifications and user data storage, to determine a user's unique identity with a specific device. Strength and criteria are set by IT administration and the SecureAuth software intelligently problem solves, using a heuristics approach, to authenticate the user, and grant access and login to the authorized mobile apps. A simplified one-time registration workflow allows users a secured access across multiple devices.
"BYOD is risky business for the enterprise because it opens additional access points for hackers and malware. The added authentication provided by SecureAuth IdP 7.0 is similar to giving users and their devices a fingerprint that is unique to only them," commented Garret Grajek, chief technology officer at SecureAuth. "Having SecureAuth IdP recognized by Network World as the easiest to manage and deploy, having the lowest cost and the most capable validates that our two-factor authentication better secures the content accessible from devices. We've again designed the most integrated access control system for mobile, web, network and SaaS based access management."
SecureAuth IdP 7.0 is currently available and works with all mobile platforms including iOS, Android, Windows and Blackberry. Organizations interested in learning more about SecureAuth IdP 7.0 can download a sample app at SecureAuth Fingerprinting Google play, or contact SecureAuth online or call 949-777-6959.
About SecureAuth
SecureAuth is a technology leader in providing single secured access for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. Located in Irvine, Calif., SecureAuth was awarded the Stevie Award for "Fastest-Growing Company" in 2012 by The American Business Awards, won the People's Choice Stevie Award for Favorite Security Solution, and was selected at "Favorite BYOD Security Solution" by UP-START. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024