Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:42 PM
Dark Reading
Dark Reading
Products and Releases

charismathics Announces iEnigma Two-Factor Authentication For iPhone

iEnigma turns the iPhone into a storage device for users' digital identities

(BUSINESS WIRE Feb. 24, 2009)--charismathics today announced the launch of the iEnigma' identity protection application for Apples iPhone and iPod Touch. This gives tens of millions of mobile device users a way to protect their data from security breaches, making it easier for enterprises to enact a "two-factor authentication" security approach.

iEnigma' turns the iPhone into a storage device for users' digital identities. When users need authenticated access, a digital signature or email or data encryption, they can enter a password and iEnigma' handles the rest, turning the iPhone itself into the second "factor" required for access. iEnigma' secures mobile devices and lets enterprises enact inexpensive two-factor authentication using mobile devices that employees already own. charismathics will also make the software available for other major smart phone platforms this year, including the support of discrete hardware and supporting major government applications.

"iEnigma' turns anyone's iPhone into a security key," said charismathics CEO Sven Gossel. "It protects email and other data on people's iPhones and saves companies money by allowing them to deploy two-factor authentication without the large cost of buying smart card readers and smart cards for every employee."

Two-factor authentication is a security system in which two factors " for example, a memorized password and a card or key " are necessary for access. This protects data far more securely than the use of a single password, which can be stolen or guessed.

iEnigma' allows companies using USB tokens or smart cards to centralize security access and encryption within mobile devices their employees already own and the network infrastructures already in place. iEnigma' will be available for download from Apple's Apps Store in April. Once downloaded, users connect via WiFi with charismathics' software, automatically installed on their computer and then they can shake their iPhone to generate a digital key. iEnigma' integrates with all common mail clients and browsers and plugs into all other charismathics software solutions, so can easily be made part of existing infrastructures.

The iPhone and iPod Touch are among several devices supported by charismathics' software, including smart cards, USB tokens and biometric devices.

About charismathics charismathics is a global leader in IT security components and identity management software for integrators, software and hardware vendors, and service providers. Its premier product, the charismathics Smart Security Interface, offers flexibility and versatility to lower overall costs in identity management. Since 2003, charismathics has delivered industry-leading security solutions that provide security, convenience and competitive total cost of ownership for the enterprise. The charismathics Smart Security Interface provides a fully integrated and transparent interface between tokens of all major hardware vendors and current IT networking environments installed worldwide. charismathics serves clients in a variety of industries including banking and finance, mobile and telecommunications, security, government and PC manufacturing. For more information, visit http://www.charismathics.com/

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS A...
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...