Endpoint

2/7/2018
10:13 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Nordea Selects Veridium to Safeguard Highly Confidential Data with Biometric Authentication

Employees will authenticate with 4 Fingers TouchlessID instead of tokens for secure and convenient high privileged access

QUINCY, Mass.--Veridium, a leader in strong authentication solutions using biometrics instead of passwords and tokens, today announced that Nordea is deploying the complete VeridiumID platform to replace tokens with biometric authentication for high privileged access to confidential and secure data. This is a critical first step in Nordea’s strategy to transformtheir organization, embracing multi-factor biometric authentication for information security classification, integrated into the data management process.

With the VeridiumID platform, 4 Fingers TouchlessID and VeridiumAD, Nordea will be able to replace tokens with biometrics, conveniently protecting high-privileged access. This effort will provide increased security, ease of use and a lower total cost of ownership that’s scalable and extendable for the enterprise. This initiative is part of Nordea’s strategy to improve how employees access data and accounts while meeting new regulatory compliance demands.

Veridium’s complete software-only solution provides expanded customization and scalability to Nordea to protect their company’s most critical data and increase security and accountability over its data access management.

“Maintaining customer, employee and company data is critical for all organizations – but especially those in the financial industry,” said James Stickland, CEO, Veridium. “With Veridium, Nordea will be able to take its first steps in advancing security for high privilege access and GDPR compliance. We’re delighted Nordea has selected Veridium for their security and authentication needs and look forward to continuing this partnership.”

VeridiumID’s Microsoft Active Directory integration component, VeridiumAD, verified as Citrix Ready®, is the first software-only solution that seamlessly integrates into Citrix StoreFront, NetScaler, and ShareFile environments, enhancing security when authenticating against Active Directory, minimizing the risks of compromised credentials and increasing productivity by providing fast and secure access to employee’s systems and accounts.

For more information on VeridiumID, VeridiumAD, and Veridium’s biometric authentication capabilities, please visithttps://www.veridiumid.com/biometric-authentication/.

 

About Nordea

We build strong and close relationships through our engagement with customers and society. Whenever people strive to reach their goals and realise their dreams, we are there to provide relevant financial solutions. We are the largest bank in the Nordic region and among the ten largest financial groups in Europe in terms of total market capitalisation with around 11 million customers, 31,500 employees and 600 branch office locations. The Nordea share is listed on the Nasdaq Stockholm, Nasdaq Helsinki and Nasdaq Copenhagen exchanges. Read more about us on nordea.com.

 

About Veridium

Veridium is a leader in the development of strong authentication solutions using biometrics instead of traditional passwords, PINs, and tokens. Powered by an unmatched legacy of IP and R&D, our software increases security, improves convenience, and reduces fraud at a lower total cost of ownership than traditional multi-factor authentication (MFA) solutions. Veridium has offices in the U.S., U.K., and Romania. For additional information, please visit www.veridiumID.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Cybercriminals Clean Their Dirty Money
Alexon Bell, Global Head of AML & Compliance, Quantexa,  1/22/2019
Facebook Shuts Hundreds of Russia-Linked Pages, Accounts for Disinformation
Sara Peters, Senior Editor at Dark Reading,  1/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's not that smart. He's running iOS 11 on a 5c."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20742
PUBLISHED: 2019-01-24
An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could cause an arbitrary enclave memory write.
CVE-2019-6486
PUBLISHED: 2019-01-24
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
CVE-2018-17693
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the con...
CVE-2018-17694
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2018-17695
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...