|By PR Newswire||
|January 9, 2014 01:39 PM EST||
WESTPORT, Conn., Jan. 9, 2014 /PRNewswire/ -- Imperium®, an established industry leader in fraud prevention and identity validation solutions, is pleased to announce that ChildGuardOnline has received approval from the FTC for its knowledge-based authentication method used to obtain verifiable parental consent. This approval signifies that online businesses that request information from children under the age of 13 now have a new, more technologically-advanced option to comply with COPPA.
ChildGuardOnline's knowledge-based authentication method offers companies the ability to ask a number of dynamically generated, "out-of-wallet" challenge/response questions to establish valid identification. Because the knowledge needed to answer the questions is difficult for anyone other than that specific person to know, it provides a more secure method to verify someone's identity. This method has been successfully used by financial institutions and many other online businesses, and has been acknowledged and approved by the FTC and other government agencies as an effective method for identity verification.
Since COPPA was established in 1998, many online businesses began obtaining parental consent using a method called "email plus". This commonly-used method involves sending an email to the parent requiring consent followed by an additional email to the parent to confirm consent. Over the years, however, tech-savvy kids have made the email plus method unreliable and easy to overcome . Additionally, email plus can impose considerable administrative costs for web sites and mobile app providers.
ChildGuardOnline uses a combination of modern, patent-pending technologies and anti-fraud methodological expertise to more accurately verify parental consent in real time. It enables websites and mobile apps to confidently comply with COPPA while saving time and resources. In addition to knowledge-based authentication, ChildGuardOnline offers a wide range of other COPPA-compliant validation techniques including, submitted address and discovered geo-location, correlation of number of children per parent, number of sites approved per parent and child, and last four digits of social security numbers, to validate parent's ID. And for the benefit of parents and guardians, the service also provides an easy-to-use parent portal where they can instantly approve and proactively manage the permissions they have authorized for their child's use via the service.
"ChildGuardOnline is a win-win solution for online businesses as well as parents. It gives websites and mobile application providers an easy, more reliable and cost-effective solution for parental consent verification, and gives parents the ability to keep their children safe," said Marshall Harrison, Founder and CEO of Imperium. "The FTC's approval of our ChildGuardOnline knowledge-based authentication method combined with Imperium's expertise in providing industry-accepted identity validation, certification and fraud-protection services, clearly makes ChildGuardOnline the best choice available." Mr. Harrison added.
Imperium's application to the FTC was the only new COPPA compliant parental consent verification method that has been approved by the Commission. The FTC's decision is reflected in its December 23, 2013 approval letter to Imperium.
Imperium is an established leader in fraud prevention and identity validation solutions designed to help businesses achieve high-level data integrity and comply with industry regulations. For over 10 years, respected companies have been relying on Imperium's comprehensive suite of technological services to accurately verify self-reported personal information and restrict fraudulent online activities. For more information visit www.imperium.com.
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
Dec. 4, 2016 09:45 AM EST Reads: 827
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Dec. 4, 2016 09:45 AM EST Reads: 519
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 4, 2016 09:30 AM EST Reads: 590
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Dec. 4, 2016 09:30 AM EST Reads: 763
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 4, 2016 09:00 AM EST Reads: 552
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:45 AM EST Reads: 789
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Dec. 4, 2016 08:30 AM EST Reads: 979
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:30 AM EST Reads: 765
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Dec. 4, 2016 08:15 AM EST Reads: 705
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Dec. 4, 2016 08:15 AM EST Reads: 752
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
Dec. 4, 2016 08:00 AM EST Reads: 689
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 4, 2016 08:00 AM EST Reads: 804
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
Dec. 4, 2016 06:45 AM EST Reads: 1,228
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Dec. 4, 2016 06:15 AM EST Reads: 6,972
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 4, 2016 05:30 AM EST Reads: 1,753