Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/25/2013
05:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecureKey briidge.net Platform Brings Trust to Mobile and Online Transactions

Privacy-enhanced identity and authentication-platform combines ID federation with device-based security

TORONTO, Canada, March 26, 2013 – SecureKey Technologies Inc. today announced the commercial availability of its cloud-based briidge.net™ identity and authentication platform – a groundbreaking solution that enables people to use devices and credentials they already have to perform strong two-factor authentication, bringing trust to mobile and online transactions.

The briidge.net suite of extended enterprise federated authentication services is easy for people to use and reduces the number of user IDs and passwords, without sacrificing security and privacy.

“Our briidge.net platform solves the trust problem of federated identification by offering a painless way to perform strong, two-factor authentication when connecting to online or mobile services without having to carry any additional tokens or cards,” said Andre Boysen, executive vice president of sales and marketing at SecureKey. “It also solves significant cost and resource issues faced by online services due to high incidents of forgotten passwords. briidge.net services allow users to authenticate themselves using their own third-party credentials with a high degree of assurance and enhanced privacy, and offers the level of reliability and security organizations demand.”

Organizations can choose between two briidge.net service offerings, depending on how frequently their users connect, and whether or not they want to support the use of third-party credentials:

briidge.net™ Enterprise service – designed for financial institutions, government, healthcare providers, mobile network operators and other extended enterprises seeking to improve the security of their existing credentials with multi-factor authentication for accessing their online and mobile applications. It supports enterprise Bring Your Own Device (BYOD) initiatives and allows users to turn consumer devices such as smartphones, tablets, laptops, and others into strong “what you have” factors for authentication. It also enables devices to act as secure readers of in-wallet credentials like contactless payment cards, identity cards or dynamic QR codes. briidge.net Enterprise customers also can enable their credentials to be accepted by others through the briidge.net Exchange service to help those organizations better cope with infrequently-used credentials.

briidge.net™ Exchange service – based on a three-party model of users, credential providers, and credential subscribers, the briidge.net Exchange service allows authentication and identity information to be exchanged between credential providers and subscribers, while maintaining user privacy and control. It enables organizations to accept credentials from a trusted third-party issuer such as a bank, government, mobile operator, or social media site. The Exchange service allows users to bring their own credentials (BYOC) from third-party providers and is ideal for infrequently-used services, such as government, utilities and telecom self-service, where password reset and account re-registrations lead to user frustration and high support costs. The briidge.net Exchange service reduces credential management expenses, increases service adoption, and easily integrates into online or mobile applications with minimal administrative overhead. The briidge.net Exchange service is an extension of SecureKey Concierge™, a service that allows Canadians to use their bank authentication credentials to securely access online services from the Government of Canada.

“Establishing trust in the identity ecosystem is an essential ingredient for success, and companies like SecureKey are providing innovative solutions to address this need,” said Don Thibeau, OIX chairman and president. “We applaud SecureKey for their efforts in delivering strong authentication and security services to enterprise companies and their mobile employees.”

The critical device-based security offered by the briidge.net platform is made possible by briidge.net DNA security software, which transforms personal devices into strong, two-factor authentication tokens. briidge.net DNA software already is embedded in third-generation Intel® Ultrabook™ computers enabled with Intel Identity Protection Technology (IPT). It is available for Windows, Mac OS®, iOS, Android™ and Blackberry® platforms, and can be embedded by developers into their apps using a software developer kit (SDK). It can also be delivered over-the-air by a trusted service manager into SIMs or embedded secure elements for hardware-based security. briidge.net DNA can securely read Visa, MasterCard, Discover, Amex, Interac, PIV, ICAO and other contactless card formats.

The briidge.net platform provides a high level of trust for a wide variety of identity and authentication applications. Unlike one-time password (OTP) solutions that require users to type codes in to browsers and are subject to intercept attacks, briidge.net uses dynamic cryptograms to improve the user experience and security of application systems. This provides strong protection from operating system malware or man-in-the-middle, server-in-the-middle and other impersonation attacks.

About SecureKey Technologies Inc. SecureKey is a global leader enabling user-centric identity and authentication networks. It provides the innovative, cloud-based briidge.net platform, which uniquely combines powerful device-based security features with privacy-enhanced federated authentication. Highly scalable and consumer-friendly, the briidge.net service enhances a wide range of online, mobile and in-person identity and payment applications for banking, government, healthcare and payments, as well as the extended enterprise. SecureKey is a Privacy by Design (PbD) Ambassador based in Toronto, Canada, with backing from leading technology, payments and mobile network operators. For more information, visit www.securekey.com. # # # For further information, please contact: Media and analyst contact:

Patrick Corman Corman Communications, LLC +1.650.326.9648 [email protected] SecureKey:

Joanne Gore Director, Marketing Communications SecureKey Technologies Inc. +1.416.543.7951 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19767
PUBLISHED: 2019-12-12
The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
CVE-2019-19768
PUBLISHED: 2019-12-12
In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).
CVE-2019-19769
PUBLISHED: 2019-12-12
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
CVE-2019-19770
PUBLISHED: 2019-12-12
In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file).
CVE-2019-19771
PUBLISHED: 2019-12-12
The lodahs package 0.0.1 for Node.js is a Trojan horse, and may have been installed by persons who mistyped the lodash package name. In particular, the Trojan horse finds and exfiltrates cryptocurrency wallets.