Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/30/2010
12:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

U.S. Department of State Joins Other Key Government Agencies In Adopting PhoneFactor

PhoneFactor provides authentication for remote workers

PhoneFactor, Inc., the leading global provider of phone-based multi-factor authentication services, today announced the addition of the US Department of State, the District of Columbia government, and the Federal Railroad Administration to its client roster. These organizations join a growing list of federal, state, and local government agencies adopting PhoneFactor to meet the rigorous security needs of their remote workforces.

In a world of escalating cyber warfare, authenticating users who have access to our nation's data -- housed within disparate government networks and accessed by an increasing number of remote workers and devices -- is vital to our national security.

Government entities are increasingly turning to PhoneFactor to provide a critical second factor of authentication for remote workers in a way that is both convenient for end users and IT departments. Because there are no security tokens to provision, manage, and support, PhoneFactor offers significant cost-savings, making it a fiscally responsible choice for government organizations.

With PhoneFactor, a government worker simply logs in remotely as he normally would. Instantly, his phone rings. He answers, presses # (or enters an optional PIN), and is immediately granted access. PhoneFactor also offers optional out-of-band SMS text authentication or voice biometric authentication.

PhoneFactor offers built-in integration with every major VPN platform, including Juniper, Cisco, and SonicWall, as well as web-based applications, like Outlook Web Access. Unlike soft tokens or certificates, there is no software to install on a user's phone or computer. And unlike hard tokens, PhoneFactor is much less cumbersome for both users and the IT department. This all adds up to a significant benefit for government organizations in an emergency situation -- PhoneFactor can rapidly and cost-effectively scale to large numbers of geographically diverse users -- as well as meeting the everyday needs of remote workers.

"In addition to top-secret intelligence data, the federal government stores a vast amount of personal information, everything from healthcare records to tax returns," observes Timothy Sutton, PhoneFactor CEO and Co-Founder. "The risk to individual citizens and national security is enormous. Government agencies are increasingly choosing PhoneFactor for its ability to meet their stringent two-factor security requirements, protecting the personal data of citizens and national security in a way that is cost-effective, scalable, and user friendly."

About PhoneFactor PhoneFactor is a leading provider of multi-factor authentication. The company's award-winning platform uses any phone as a second form of authentication. PhoneFactor's out-of-band architecture and real-time fraud alerts provide strong security for enterprise and consumer applications. It's easy and cost effective to set up and deploy to large numbers of geographically diverse users. PhoneFactor was recently named to the Bank Technology News FutureNow list of the top 10 technology innovators securing the banking industry today and a finalist in 2010 SC Magazine Reader Trust Awards. Learn more at www.phonefactor.com.

Contact: Alison Hill Marketing Manager [email protected] (913) 499-4146

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.