Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

12/12/2012
01:51 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NCP Engineering Releases Secure Enterprise Management Version 3.0

SEM 3.0 enables two-factor authentication with a one-time password

Mountain View, CA – December 11, 2012 – NCP engineering today announced the availability of a new version of its Secure Enterprise Management (SEM), software that streamlines the tasks of remote access to a few clicks. Built around the all-new NCP Advanced Authentication, SEM 3.0 enables powerful Two-Factor Authentication with a One-Time Password that users receive via SMS. Each password is created by a random number generator within the NCP Advanced Authentication Connector and is automatically canceled after use. This eliminates the need to use third party solutions and enables Two-Factor Authentication with only a mobile or smartphone.

Key Facts

· With the new NCP Advanced Authentication, SEM 3.0 elevates the security of the entire NCP Secure Enterprise Solution, which is comprised of a VPN client suite, hybrid IPsec/SSL VPN server and the remote access VPN management system.

· The NCP Secure Enterprise Solution is a 100% software solution developed from the ground up to be interoperable with all major network-layer security technologies, including VPN gateways and firewalls, preventing vendor-lock pitfalls. It also supports the broadest range of end device platforms, including Windows 8/7/Vista/XP, Windows Mobile/Phone, Android, Mac OS X, Mac iOS, BlackBerry, Symbian and Linux.

· As a centrally controlled solution, SEM 3.0 provides a single point of network administration for a company's entire IPsec and SSL VPN network, in addition to full Network Access Control (NAC) management. Administrators are able to provision and configure remote access capabilities to help prevent "bandwidth hogging" and wireless data consumption fees.

Resources

· For more about NCP engineering and its and its centrally managed enterprise VPN solution, visit www.ncp-e.com

· Reach NCP engineering on its blog, VPN Haus, LinkedIn, Twitter, or YouTube

Tags

NCP engineering, Security, Remote Access, IPsec, SSL, VPN, Hybrid VPN, Authentication, Advanced Authentication, Two-Factor Authentication, One-Time Password, the NCP Advanced Authentication Connector.

About NCP engineering

Since its inception in 1986, NCP engineering has delivered innovative software that allows enterprises to rethink their remote access, and overcome the complexities of creating, managing and maintaining secure network access for staff.

NCP's award-winning product line spans the spectrum of remote access, from IPsec / SSL VPNs to endpoint firewalls and network access control (NAC) functions. The company's products support organizations with complex remote user needs, and that want to leverage the latest end-devices to increase staff productivity, reduce network administration and adapt policy changes on-the-fly. Each solution is interoperable with existing third-party software or hardware.

With global headquarters in Nuremberg, Germany and North American headquarters in the San Francisco Bay Area, the company serves 35,000-plus customers worldwide throughout the healthcare, financial, education and government markets, as well as many Fortune 500 companies. NCP has established a network of national and regional technology, channel and OEM partners to serve its customers. For more information, visit www.ncp-e.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
CVE-2019-6659
PUBLISHED: 2019-11-15
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.
CVE-2019-6660
PUBLISHED: 2019-11-15
On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service.
CVE-2019-6661
PUBLISHED: 2019-11-15
When the BIG-IP APM 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.4.1, or 11.5.1-11.6.5 system processes certain requests, the APD/APMD daemon may consume excessive resources.