Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:45 AM
Dark Reading
Dark Reading
Products and Releases

SecureAuth Launches "Fingerprint" Authentication For BYOD Security

SecureAuth IdP 7.0 uses an heuristics approach to identify, authenticate, and assert access to mobile devices and apps

IRVINE, Calif., May 21, 2013 – SecureAuth, a leading provider of identity enforcement technology for the enterprise, today launched SecureAuth IdP 7.0, an identity access management software that uses an heuristics approach to identify, authenticate and assert access to mobile devices and apps. SecureAuth IdP 7.0 addresses organizations' need for stronger mobile security when managing the growing number of bring your own devices (BYOD) and simplifies the login and access process for employees who use multiple devices at work including desktops, tablets and smartphones. SecureAuth IdP recently won an independent enterprise authentication test conducted by Network World and was noted as "best in breed" by editors. SecureAuth will demonstrate the solution at CTIA 2013 booth 4020.

Phillip Redman, VP distinguished analyst at Gartner research firm stated, "Bring your own device is adding complexity to IT departments, including assessing the need for additional endpoint data protection and backup capabilities. IT managers must develop and deploy policies to ensure data security without compromising user productivity."

SecureAuth IdP 7.0 uses up to 14 different authentication options, such as variations to HTTP headers, IP address, browser specifications and user data storage, to determine a user's unique identity with a specific device. Strength and criteria are set by IT administration and the SecureAuth software intelligently problem solves, using a heuristics approach, to authenticate the user, and grant access and login to the authorized mobile apps. A simplified one-time registration workflow allows users a secured access across multiple devices.

"BYOD is risky business for the enterprise because it opens additional access points for hackers and malware. The added authentication provided by SecureAuth IdP 7.0 is similar to giving users and their devices a fingerprint that is unique to only them," commented Garret Grajek, chief technology officer at SecureAuth. "Having SecureAuth IdP recognized by Network World as the easiest to manage and deploy, having the lowest cost and the most capable validates that our two-factor authentication better secures the content accessible from devices. We've again designed the most integrated access control system for mobile, web, network and SaaS based access management."

SecureAuth IdP 7.0 is currently available and works with all mobile platforms including iOS, Android, Windows and Blackberry. Organizations interested in learning more about SecureAuth IdP 7.0 can download a sample app at SecureAuth Fingerprinting Google play, or contact SecureAuth online or call 949-777-6959.

About SecureAuth

SecureAuth is a technology leader in providing single secured access for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. Located in Irvine, Calif., SecureAuth was awarded the Stevie Award for "Fastest-Growing Company" in 2012 by The American Business Awards, won the People's Choice Stevie Award for Favorite Security Solution, and was selected at "Favorite BYOD Security Solution" by UP-START. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
PUBLISHED: 2019-07-19
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.
PUBLISHED: 2019-07-19
** DISPUTED ** An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A at least to 7.20A.252.062. The (1) management SSH and (2) management TELNET features allow remote attackers to cause a denial of service (connection slot e...
PUBLISHED: 2019-07-19
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
PUBLISHED: 2019-07-19
A security vulnerability in HPE IceWall SSO Agent Option and IceWall MFA (Agent module ) could be exploited remotely to cause a denial of service. The versions and platforms of Agent Option modules that are impacted are as follows: 10.0 for Apache 2.2 on RHEL 5 and 6, 10.0 for Apache 2.4 on RHEL 7, ...