Welcome!

News Feed Item

Swivel Secure Enhances Operational Agility for Customers and Channel Partners

Swivel Secure, the global leader in tokenless authentication technology today announces a number of operational changes that will deliver greater agility in its engagement with both customers and channel partners.

Flexible pricing models for resellers

In order to support increasing market demand for tokenless authentication to be offered as part of a wider managed service, Swivel today announces a new, short term, utility styled pricing scheme for channel partners operating in this market. Demand for greater flexibility in pricing has in part been driven by the increasing popularity of the Microsoft Office 365 environment for which Swivel is the only approved tokenless authentication provider.

By aligning its contract and payments terms with a managed services business model, Swivel has enabled channel partners to roll its authentication platform into their own managed service offerings without incurring the risks associated with traditional annual vendor contracts. Offering resellers short-term contracts and monthly payments will enable them to pass on this flexibility to customers.

Having month-by-month flexibility on pricing will enable end user organisations to tailor their use of the Swivel platform over time to best suit their requirements, using whatever combination of technologies they need to fit with their security policies and compliance regulations. Unlike other tokenless authentication providers that offer managed service models, Swivel provides organisations with the flexibility to choose what to securely connect to - web, VPN, cloud or desktop - as well as the freedom to select the communication tools used to manage to the process: mobile app, SMS, telephony or web. This freedom resolves a variety of authentication headaches faced by organisations that are wrestling with the need to continually update their security policies in line with increasing demands for new devices and applications to connect to the corporate network.

Swivel authentication platform: Shortened release cycle

Swivel has transformed its platform development and rollout procedures, adopting an agile approach, dramatically shortening the lead time between each release to just six to eight weeks. The move will simplify the process of upgrading to the latest version and accelerate the delivery of new platform enhancements to customers.

Instead of managing a substantial upgrade every six to nine months, the shortened release cycle will also enable Swivel’s customers to benefit from new features and other enhancements as they are developed.

As part of this change, release 3.9.2 updates the way configuration data is stored on the Swivel server such that when the new version of the software is deployed it does not overwrite the existing configuration but instead reads and upgrades the configuration automatically. This important development greatly reduces the time, resources and risks associated with upgrading the platform.

“These changes evidence Swivel’s intent to build greater agility and flexibility into both its daily operations and its authentication platform, in order to keep pace with the evolving market for two factor authentication,” comments Chris Russell, VP of Engineering, Swivel. “As Swivel continues to grow its global reseller base, it is vital that we continue to support our channel effectively. We take our responsibilities as a vendor seriously and have moulded our offering to suit the needs of both our partners and customers.”

The Swivel authentication platform was first launched in 2003. It is now used by major global enterprises, local government, the NHS and hundreds of smaller business, in over 35 countries, to remotely access their business networks, virtual desktops and Cloud-based applications. Offering the widest range of user deployment options according to Gartner, the leading IT industry analysts, the Swivel platform offers the choice of mobile apps, SMS and interactive voice response channels when full two-factor authentication is mandatory.

-ENDS-

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Infrastructure is widely available, but who’s managing inbound/outbound traffic? Data is created, stored, and managed online – who is protecting it and how? In his session at 19th Cloud Expo, Jaeson Yoo, SVP of Business Development at Penta Security Systems Inc., discussed how to keep any and all infrastructure clean, safe, and efficient by monitoring and filtering all malicious HTTP/HTTPS traffic at the OSI Layer 7. Stop attacks and web intruders before they can enter your network.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.