Welcome!

News Feed Item

SecureAuth Corporation and FishNet Security Team to Help Organizations Reduce the Risk of Unauthorized Access and Misuse of Portable Identities

SecureAuth Corporation, the leading provider of Identity Enforcement solutions, today announced a strategic alliance with FishNet Security, the number one provider of information security solutions that combine technology, services, support and training. Through this agreement, FishNet Security worldwide consultants will resell and implement the SecureAuth Identity Enforcement Platform (IEP). By partnering with FishNet Security, SecureAuth further extends the availability of its patented, world-renowned Identity Enforcement Platform to secure and simplify access to cloud, web and VPN resources with integrated 2-Factor Authentication, SSO, and IdM.

“We are committed to helping our clients address all of their security challenges and are there for them as they transition applications to the cloud,” said Gary Fish, FishNet Security president and CEO. "SecureAuth is an important component of our cloud security strategy and by partnering with them our customers gain access to some of the world's most advanced technology to protect their cloud, web and VPN resources from unauthorized access and the misuse of portable identities. In one solution, SecureAuth’s identity management and enforcement platform enhances our ability to secure and simplify remote access for our client’s applications on-premise and in the cloud."

“Partnering with FishNet Security allows us to quickly expand our horizons and extend our reach to many more customers,” stated Craig Lund, SecureAuth chief executive officer. “FishNet is known for their expertise in security and cloud computing and will be instrumental in helping many customers make the transition smoothly and securely. The FishNet team and our innovative approach to identity enforcement is a powerful combination. The timing is perfect. The need to secure and simplify access is in high demand with security, network and application teams, especially those tasked with extending their enterprise to the cloud."

FishNet Security has industry recognized security consultants, support and training services, and sales professionals who can assist clients in deploying, configuring and integrating SecureAuth IEP into their infrastructure.

About SecureAuth Corporation

SecureAuth is the market leader in identity enforcement for cloud, web, and VPN resources. SecureAuth makes it safe for organizations of any size to extend their enterprise to the cloud by simplifying access, reducing the risk of unauthorized access, phishing, and the misuse of portable enterprise identities. Known world-wide for SecureAuth IEP, its all-in-one Identity Enforcement Platform, SecureAuth delivers integrated 2-Factor Authentication, SSO, and IdM for less than the cost of a token-based solution. Strategic partners and customers include leaders in finance, government, healthcare, manufacturing, retail, technology, and services. Visit www.gosecureauth.com for additional information.

About FishNet Security

FishNet Security is the #1 provider of information security solutions that combine technology, services, support and training. Organizations are opening their computing environments to accelerate business initiatives. Unfortunately, with limited budget and resources to manage risk, uninformed decisions result in data breaches, negative publicity, decreased revenue, and disruption of services. Providing the most comprehensive security offering, FishNet Security enables clients to manage risk, meet compliance requirements, and reduce costs while maximizing security effectiveness and operational efficiency. Unlike Systems Integrators, Technology Resellers, and VARS, FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to over 4,500 clients nationwide. For more information, please visit http://www.fishnetsecurity.com.

SecureAuth, SecureAuth IEP and the SecureAuth logo are registered trademarks of SecureAuth Corporation. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
MongoDB Atlas leverages VPC peering for AWS, a service that allows multiple VPC networks to interact. This includes VPCs that belong to other AWS account holders. By performing cross account VPC peering, users ensure networks that host and communicate their data are secure. In his session at 20th Cloud Expo, Jay Gordon, a Developer Advocate at MongoDB, will explain how to properly architect your VPC using existing AWS tools and then peer with your MongoDB Atlas cluster. He'll discuss the secur...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, will present a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to max...