Welcome!

News Feed Item

PortalGuard's Five Layer Authentication Offers Quintessential Solutions for the Worsening Webmail Vulnerability Crisis

AMHERST, NH -- (Marketwire) -- 01/31/13 -- The PortalGuard platform's layered authentication approach adds protection which is crucial in defending Outlook Web App (OWA) against attacks, an often overlooked and critically weak focal point for illegitimate access to most any corporate network, with minimal tradeoff between security and usability.

Through providing a variety of two-factor authentication methods for logins, the PortalGuard platform effectively alleviates the threat of compromised webmail credentials, greatly enhancing and securing OWA's native simple password authentication. In addition, the platform presents options for enhancing the authentication for self-service password reset, eliminating the compromise between allowing user self-service and softening security.

"It is very clear that in an unprecedented number of accounts involving the compromise of corporate infrastructure in recent years, access to employee email accounts were a primary factor," says Thomas Hoey, founder and CEO of PortalGuard, a company whose principals have always centered on providing companies with low-risk, robust functionality, and dedicated customer service, all while maintaining usability at an affordable price point. "Webmail access is sought after by hackers for an overwhelming number of reasons. An email account contains a wealth of data that can be easily leveraged for further takeover of the individuals or company's assets or services," Hoey says. "Everything from password reset links, sensitive corporate information, and all of your personal data is there as well, to be waded through for answers to password recovery questions. It's in essence an archive with everywhere you've been and everything you've done online, making it the perfect place to initiate any sort of attack. Most OWA logins are publicly available and typically secured with the simplest lock available: a basic password."

To hearken to the theme of usability, PortalGuard also offers completely transparent One-time Password (OTP) delivery methods to achieve its two-factor authentication in addition to the traditional, tangible type. Through use of its Transparent Tokenless Toolbar (TTT) browser plugin, the enhanced protection of two-factor authentication is combined with utmost usability, when a user is able to submit a full-fledged two-factor authentication without the need of a phone, hard-token, or anything the user has besides their laptop. The TTT automatically generates time based OTPs (TOTPs) on a regular interval, as well as encrypts the OTP value with public key cryptography. This ensures that the OTP is only able to be decrypted and read by the PortalGuard server, as well as severely limits the amount of time the OTP is valid if it were to be somehow compromised. With the TTT plugin installed, authenticating on a machine that passes a set of risk-based criteria requires just the users' password, nothing more than a standard OWA login, despite that a secure two-factor authentication is actually taking place.

"For many, the importance of locking down your webmail access appears to be overlooked," Hoey continues, "Others are certainly actively securing their OWA logins, through SSL, or hiding them behind reverse proxies, which are all partial answers. The fact of the matter is: multi-factor authentication is the only solution that addresses the issue of it being a weakest link in its entirety."

The full version of the PortalGuard authentication platform software is available for $7,500 USD per installation, and comes with a 90 day money back guarantee. A trial version of PortalGuard is also available. For details, please visit the company website (www.portalguard.com).

Add to Digg Bookmark with del.icio.us Add to Newsvine

Kimberly Johnson
Email Contact
PO Box 1226
Amherst NH, 03031
603.547.1200

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
"We focus on composable infrastructure. Composable infrastructure has been named by companies like Gartner as the evolution of the IT infrastructure where everything is now driven by software," explained Bruno Andrade, CEO and Founder of HTBase, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and thei...