Click here to close now.




















Welcome!

News Feed Item

Swivel Secure Enhances Operational Agility for Customers and Channel Partners

Swivel Secure, the global leader in tokenless authentication technology today announces a number of operational changes that will deliver greater agility in its engagement with both customers and channel partners.

Flexible pricing models for resellers

In order to support increasing market demand for tokenless authentication to be offered as part of a wider managed service, Swivel today announces a new, short term, utility styled pricing scheme for channel partners operating in this market. Demand for greater flexibility in pricing has in part been driven by the increasing popularity of the Microsoft Office 365 environment for which Swivel is the only approved tokenless authentication provider.

By aligning its contract and payments terms with a managed services business model, Swivel has enabled channel partners to roll its authentication platform into their own managed service offerings without incurring the risks associated with traditional annual vendor contracts. Offering resellers short-term contracts and monthly payments will enable them to pass on this flexibility to customers.

Having month-by-month flexibility on pricing will enable end user organisations to tailor their use of the Swivel platform over time to best suit their requirements, using whatever combination of technologies they need to fit with their security policies and compliance regulations. Unlike other tokenless authentication providers that offer managed service models, Swivel provides organisations with the flexibility to choose what to securely connect to - web, VPN, cloud or desktop - as well as the freedom to select the communication tools used to manage to the process: mobile app, SMS, telephony or web. This freedom resolves a variety of authentication headaches faced by organisations that are wrestling with the need to continually update their security policies in line with increasing demands for new devices and applications to connect to the corporate network.

Swivel authentication platform: Shortened release cycle

Swivel has transformed its platform development and rollout procedures, adopting an agile approach, dramatically shortening the lead time between each release to just six to eight weeks. The move will simplify the process of upgrading to the latest version and accelerate the delivery of new platform enhancements to customers.

Instead of managing a substantial upgrade every six to nine months, the shortened release cycle will also enable Swivel’s customers to benefit from new features and other enhancements as they are developed.

As part of this change, release 3.9.2 updates the way configuration data is stored on the Swivel server such that when the new version of the software is deployed it does not overwrite the existing configuration but instead reads and upgrades the configuration automatically. This important development greatly reduces the time, resources and risks associated with upgrading the platform.

“These changes evidence Swivel’s intent to build greater agility and flexibility into both its daily operations and its authentication platform, in order to keep pace with the evolving market for two factor authentication,” comments Chris Russell, VP of Engineering, Swivel. “As Swivel continues to grow its global reseller base, it is vital that we continue to support our channel effectively. We take our responsibilities as a vendor seriously and have moulded our offering to suit the needs of both our partners and customers.”

The Swivel authentication platform was first launched in 2003. It is now used by major global enterprises, local government, the NHS and hundreds of smaller business, in over 35 countries, to remotely access their business networks, virtual desktops and Cloud-based applications. Offering the widest range of user deployment options according to Gartner, the leading IT industry analysts, the Swivel platform offers the choice of mobile apps, SMS and interactive voice response channels when full two-factor authentication is mandatory.

-ENDS-

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
eCube Systems has released NXTmonitor, a full featured application orchestration solution. NXTmonitor, which inherited the code base of NXTminder, has been extended to support multi-discipline processes and will act as a DevOps utility in a heterogeneous enterprise environment. Previously, NXTminder was packaged with NXTera middleware to configure and manage Entera and NXTera RPC servers. “Since we are widening the focus of this solution to DevOps, we felt the need to change the name to NXTmon...
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small,...
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
ElasticBox, the agile application delivery manager, announced freely available public boxes for the DevOps community. ElasticBox works with enterprises to help them deploy any application to any cloud. Public boxes are curated reference boxes that represent some of the most popular applications and tools for orchestrating deployments at scale. Boxes are an adaptive way to represent reusable infrastructure as components of code. Boxes contain scripts, variables, and metadata to automate proces...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Com...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...