Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/22/2013
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecureAuth Launches "Fingerprint" Authentication For BYOD Security

SecureAuth IdP 7.0 uses an heuristics approach to identify, authenticate, and assert access to mobile devices and apps

IRVINE, Calif., May 21, 2013 – SecureAuth, a leading provider of identity enforcement technology for the enterprise, today launched SecureAuth IdP 7.0, an identity access management software that uses an heuristics approach to identify, authenticate and assert access to mobile devices and apps. SecureAuth IdP 7.0 addresses organizations' need for stronger mobile security when managing the growing number of bring your own devices (BYOD) and simplifies the login and access process for employees who use multiple devices at work including desktops, tablets and smartphones. SecureAuth IdP recently won an independent enterprise authentication test conducted by Network World and was noted as "best in breed" by editors. SecureAuth will demonstrate the solution at CTIA 2013 booth 4020.

Phillip Redman, VP distinguished analyst at Gartner research firm stated, "Bring your own device is adding complexity to IT departments, including assessing the need for additional endpoint data protection and backup capabilities. IT managers must develop and deploy policies to ensure data security without compromising user productivity."

SecureAuth IdP 7.0 uses up to 14 different authentication options, such as variations to HTTP headers, IP address, browser specifications and user data storage, to determine a user's unique identity with a specific device. Strength and criteria are set by IT administration and the SecureAuth software intelligently problem solves, using a heuristics approach, to authenticate the user, and grant access and login to the authorized mobile apps. A simplified one-time registration workflow allows users a secured access across multiple devices.

"BYOD is risky business for the enterprise because it opens additional access points for hackers and malware. The added authentication provided by SecureAuth IdP 7.0 is similar to giving users and their devices a fingerprint that is unique to only them," commented Garret Grajek, chief technology officer at SecureAuth. "Having SecureAuth IdP recognized by Network World as the easiest to manage and deploy, having the lowest cost and the most capable validates that our two-factor authentication better secures the content accessible from devices. We've again designed the most integrated access control system for mobile, web, network and SaaS based access management."

SecureAuth IdP 7.0 is currently available and works with all mobile platforms including iOS, Android, Windows and Blackberry. Organizations interested in learning more about SecureAuth IdP 7.0 can download a sample app at SecureAuth Fingerprinting Google play, or contact SecureAuth online or call 949-777-6959.

About SecureAuth

SecureAuth is a technology leader in providing single secured access for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. Located in Irvine, Calif., SecureAuth was awarded the Stevie Award for "Fastest-Growing Company" in 2012 by The American Business Awards, won the People's Choice Stevie Award for Favorite Security Solution, and was selected at "Favorite BYOD Security Solution" by UP-START. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8033
PUBLISHED: 2020-08-14
In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.
CVE-2020-15692
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands...
CVE-2020-15693
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values...
CVE-2020-15694
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
CVE-2015-8032
PUBLISHED: 2020-08-14
In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.