Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

11/12/2019
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HID Global Risk-Based User Authentication Tool Goes Live on Temenos MarketPlace

AUSTIN, Texas, November 12, 2019 – HID Global, a worldwide leader in trusted identity solutions, today announced it has collaborated with Temenos (SIX: TEMN), the banking software company, to integrate HID’s risk-based authentication solution with Temenos Infinity, a breakthrough digital front office product, and Temenos T24 Transact, the next generation in core banking. The joint offering, available on-premise or in the cloud, provides an agile, simplified path to secure digital banking, reducing the time and cost of delivering risk-based adaptive authentication, threat detection, and transaction signing on the Temenos platform. As part of the integration, HID Global’s authentication solution can now offer self-service functions to over 3,000 Temenos customers through Temenos MarketPlace.

Temenos MarketPlace serves as an online store, where Temenos curates the most innovative fintechs and connects them with financial institutions from around the world. HID Global’s authentication solution for Temenos customers combines its ActivID® Authentication Platform with the HID Risk Management Solution featuring real-time risk profiling technology. Also included is HID Approve™, a next-generation multi-factor authentication solution for online and mobile banking customers that combines the security of public key-based cryptography and mobile-based out-of-band transaction signatures with the convenience of mobile push notifications.

“HID has partnered with Temenos for more than a decade to provide solutions for nearly 100 banks worldwide,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “This latest collaboration streamlines banks’ ability to implement advanced user authentication services with Temenos Infinity and Temenos T24 Transact. The pre-configured integration makes it easier than ever for Temenos customers to deploy out authentication tools without any customized development.”

HID Global’s three plug-and-play components for risk-based authentication are tightly integrated with Temenos Infinity and Temenos T24 Transact. They provide several key capabilities that enable existing financial institutions and new digital startups to better facilitate secure digital banking:

  • User profiles are automatically synchronized to the multi-tenant HID Authentication service when new accounts are created in Temenos T24 Transact.
  • Administrators manage user authentication in Temenos Infinity. The solution handles all authentication administration tasks including management of the user device and credentials, in addition to displaying user authentication events and audit logs directly within Temenos Infinity. 
  • The HID Risk Management solution enables customers to protect their financial transaction systems and banking applications using a combination of evidence-based threat detection capabilities with behavioral biometrics supported by machine learning.

“As more and more customers bank through digital channels, incidents of fraud naturally increase, and the ramifications to both bank and consumer can be massive,” said Adam Gable, Product Director – Financial Crime Mitigation, Treasury and Risk, Temenos. “Banks need to protect their customers as well as retain them and improve trust. Using a combination of innovative technologies and techniques, HID’s risk-based authentication solution means customers benefit from improved security at the source of the financial transaction – the device. The solution is a great addition to the Temenos MarketPlace, pre-built to work with the cloud-native and cloud-agnostic Temenos Infinity and Temenos T24 Transact. With this integration, Temenos customers will benefit from reduced cost and complexity of integration, while gaining access to a greater variety in security options.

“We are very excited to see our long-standing relationship with HID further strengthened with the introduction of this risk-based user authentication solution,” said Paul Roberts, Director – Temenos MarketPlace. “In today’s digital banking world, this solution brings essential protection and additional peace of mind for both banks and their customers.”

The multi-tenant HID Authentication Service includes interoperable Application Programming Interfaces (APIs) to allow for standard integrations with third-party software and supports easy scalability, testing and deployment.

Click here for more information about HID’s advanced multi-factor authentication for banking.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...