Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/20/2013
02:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Clavid Launches Authentication As A Service

Clavid enables users to combine the authentication methods that are already in place so they can use one single login to access all Internet services

ST. GALLEN, Switzerland, June 20, 2013 /PRNewswire/ --

We disclose much that is private and confidential on the Internet. That's why "Internet" and "security" go hand in hand. Recurring attacks by hackers against online shops, cloud services or social networks make it even more essential for us to provide better protection for our own data. However, many Internet services have serious weaknesses in this regard. These gaps are easy targets for hackers. But they don't have to be! Clavid is launching the solution to this problem by offering Authentication as a Service.

Picture can be downloaded under:

http://www.presseportal.ch/go2/clavid_illustration

Closing security gaps on the Internet

Various good authentication processes are available that can guarantee a high level of security and keep hackers at bay. But what use are these excellent tools if operators of online shops, cloud services or web portals fail to use them? Many Internet services simply carry on operating their unsafe login procedures - mostly consisting of a user name and password - without any clear idea of the consequences of potential abusive access. Why do they run this unacceptable risk?

The authentication services that are available saddle Internet service providers with high implementation expenses for installation and licences, as well as considerable extra logistics costs depending on whether tokens (such as USB

sticks) are also sent. At the same time, users are expected to go through a separate login procedure for each service. In the worst case, they have to carry several hardware tokens around with them. Why not choose a simpler option?

Clavid has developed a solution that eliminates the weaknesses of existing systems and makes security comfortable.

One key, access from anywhere, low costs

Clavid's innovative interface technology combines all the authentication procedures currently available on the market into one service. What we offer is unique in the world: Authentication as a Service (AaaS). Internet service providers use this simple solution from Clavid as an authentication procedure that delivers enhanced comfort and security for themselves and their customers.

At the same time, they cut their costs substantially - and their customers will also be delighted: Clavid gives them simple and secure access to all the Internet services they use. Users log into Clavid with the login method that they select personally, and then they are simply and unambiguously identified and accredited as authorised persons. No other provider anywhere in the world can currently offer such strong, simple and secure authentication.

Life made simpler and safer for private Internet users

At present, it is often the case that Internet service users can only log in with an insecure combination of a user name and a password. Most Internet services do not offer strong authentication, and private users have to keep records of numerous user names and passwords. This is impractical and complicated, and it is not secure. The same applies to service providers, because password renewals account for over 30% of IT costs. Clavid enables users to combine the authentication methods that are already in place so they can use one single login to access all Internet services - and then they can continue to surf safely.

Lower risks and costs for business customers

Clavid's Single Sign-On (as it is known) gives companies a convenient way of regulating their employees' access and user rights. Managers no longer have to bother with individual access methods for different systems and platforms.

Clavid implements the company's wishes and requirements without expenses for every single integration of a large number of services.

Cutting costs for Internet service providers

Internet companies no longer have to opt for one authentication procedure. This significantly cuts implementation costs, support expenditure and outage risks.

Now they only pay one predictable installation fee while Clavid takes care of everything else.

Reduced outlay for authentication procedure producers

Producers of authentication procedures currently incur huge costs in order to market their services to the operators of countless Internet services. Separate contracts have to be negotiated with each of them, at enormous expense. This is why the producers are eager to have a joint market presence with Clavid so that they can launch their new methods across the globe in one fell swoop.

"Swiss Privacy" makes the Internet world more secure

Clavid's innovative offering delivers benefits to private and commercial Internet users, Internet service providers and producers of authentication procedures. It makes digital identification more secure and easier to implement, and it saves time and money. Thanks to Clavid, "Swiss Privacy" - one of Switzerland's core competences - is now also available for the Internet.

Let's use Clavid the key for your safety in our digital world

About Clavid AG:

Clavid AG offers high-calibre services, solutions and products for the professional IT security environment. Our core competences focus on authentication and authorisation in the digital world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.