VeriSign's VIP Access For Mobile Credential Available For DownloadVeriSign's VIP Access For Mobile Credential Available For Download
Works with more than 90 mobile phone models, including the BlackBerry (Storm, Curve, Pearl and Bold), as well as the Motorola RAZR, and others from Nokia and Sony Ericsson
April 21, 2009
RSA CONFERENCE, SAN FRANCISCO -- April 20, 2009 -- VeriSign, Inc. (NASDAQ: VRSN), the trusted provider of Internet infrastructure services for the networked world, today announced that the VeriSign' Identity Protection (VIP) Access for Mobile credential is now available for download onto more than 90 popular mobile phone models including the BlackBerry (Storm, Curve, Pearl and Bold), as well as the Motorola RAZR and others from Nokia and Sony Ericsson.
With VIP Access for Mobile, tens of millions of mobile phone users can enjoy strong authentication with a single credential when they log into eBay, PayPal and more than 45 other sites that are part of the VIP Network. Available immediately, VIP Access for Mobile is a free, easy-to-install application that transforms leading mobile phones into strong authentication credentials capable of generating a unique one-time password (OTP) every time a consumer signs on to Web site protected by the VIP Authentication Service. Users are granted access to their online accounts only after their OTP, username and password are all matched to their identity.
"Transforming mobile phones into VIP credentials is a key element in the effort to give two-factor authentication a broader footprint among consumers and enterprises," said Fran Rosch, senior vice president of Authentication Product and Strategy at VeriSign. "VIP Access for Mobile is part of our strategy to make VIP strong authentication ubiquitous by making it increasingly easier for users and enterprises alike to adopt and use."
Available today, VIP Access for Mobile can be downloaded for free at https://m.verisign.com The officially supported carriers and regions include: AT&T, Sprint and Verizon (BlackBerry only) in the U.S.; AirTel in India; and O2 and Vodafone in the UK. VIP Access for Mobile adds two-factor authentication capabilities to various BlackBerry models and popular J2ME enabled phones from Nokia, Motorola and Sony Ericsson (in addition to the previously-announced Apple iPhone). Once installed, the application gives mobile users anytime, anywhere access to OTPs for strong authentication generated by a device they already carry.
By implementing two-factor authentication through VeriSign's Security-as-a-Service model, enterprises virtually eliminate the costly IT infrastructure investments once required to deploy proprietary authentication systems. VeriSign's open standards-based Security-as-a-Service solution also speeds time to market and drives down per user costs. And with mobile phones serving as free VIP credentials, enterprises can scale their potential user base at negligible per-user costs.
Deploying VIP protection enables enterprises to directly address consumers' concerns about online security. A recent survey found that 86 percent of consumers prefer sites that enable proactive security measures such as two-factor authentication. Meanwhile, 68 percent said they would like better systems in place to protect their identities, and 41 percent said they would consider new applications offering identity protection, even if that meant extra steps on their part. (Source: VeriSign/Synovate research)
About VeriSign VeriSign, Inc. (NASDAQ: VRSN) is the trusted provider of Internet infrastructure services for the networked world. Billions of times each day, VeriSign helps companies and consumers all over the world engage in communications and commerce with confidence. Additional news and information about the company is available at www.verisign.com.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report