Welcome!

News Feed Item

Easy Solutions Delivers Advanced Mobile Authentication

Easy Solutions, the Total Fraud Protection® company, today launched the latest version of its authentication solution, DetectID, which includes a new push authentication capability, providing banks with a superior out-of-band authentication and user experience. The new release of DetectID provides a framework for banks to leverage push notifications technology to enable bi-directional communications with customers to approve, on their phone, online activities such as login request, transaction request, or changes to their personal online profile. Additionally, with this technology integrated in mobile banking apps, banks also have an opportunity to transform their existing alerts offering from a reactive alert service to a proactive customer engagement service, where customers can instantly take action on an alert.

Push authentication is available as a software library for banks and enterprises to integrate into their own mobile applications for seamless authentication, or as a stand-alone mobile application. It’s currently supported for Apple iOS and Google Android.

According to a recently released report, global smartphone penetration surpassed 1 billion users in 2012 and will total 1.75 billion by the end of 2014. As of December of 2013, one in every five people in the world own a smartphone. This movement holds the promise for safer and more convenient authentication solutions compared to SMS One-Time Password (OTP) messages, which are not user-friendly, can be costly, may inhibit user adoption and even drive some users away. Easy Solutions DetectID with push authentication harnesses the smartphone native security architecture to secure the device and leverage it to authenticate customers in a way that minimizes user experience friction points and reduces two factor authentication costs.

“Mobile authentication represents a major challenge for banks as they seek to secure vulnerable end-points without compromising the end-user experience,” said Daniel Ingevaldson, CTO of Easy Solutions. “DetectID is setting a new standard in mobile banking by offering effortless mobile security and leveraging mobile banking applications to secure customers’ identity.”

DetectID with push authentication includes some of the following capabilities:

  • Hardened End-Point Security: Push authentication messages can only be sent to registered devices and are impossible to redirect, greatly reducing Man-in-the-Middle attacks and account takeovers. Push authentication also does not store any personal information and eliminates the possibility of SIM redirection attacks.
  • Improved End-User Experience: End users don’t need to wait for a One-Time Password (OTP) request, email, or any other type of inconvenient out-of-band authentication method to gain secure access to their banking app.
  • Multi-Channel Support: Push authentication is part of DetectID Authentication Framework which provides strong authentication methods for all banking channels. DetectID also integrates with legacy authentication schemes, enabling fast and simple migration.
  • Comprehensive APIs: DetectID includes comprehensive APIs for self-service management, including device provisioning and activation, as well as the management of the push notifications workflow.
  • Native SDK Support: Organizations can embed transparent authentication in their mobile application using the DetectID SDK. The SDK provides device authentication and push authentication technology from within a native application. By transparently embedding push authentication technologies, you can secure your customers’ identity without requiring them to download a third-party app.
  • Trusted Device with real-time mobile risk analytics and threat deactivation: Easy Solution SDK harnesses the unique value proposition of the Total Fraud Protection platform, which, in addition to push authentication provides key metrics and data intelligence from the device to make decisions on the transaction risk and extend proactive protection that detect and block threats. By securing the device first, organizations can securely leverage their customers’ mobile device for authentication.

Push authentication is also available with DetectID Cloud, which provides strong multi-factor authentication for cloud applications. The newest version of DetectID and DetectID Cloud are available immediately from Easy Solutions and its business partners worldwide. More information about DetectID can be found at: http://www.easysol.net/newweb/Products/DetectID

ABOUT EASY SOLUTIONS

Easy Solutions delivers Total Fraud Protection® to more than 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.

United States: 1401 Sawgrass Corporate Parkway, Sunrise, FL 33323. Tel. 1 (866) 524 4782

Latin America: Cra. 13A No. 98 – 21 Of. 401. Bogota, Colombia. Tel. +57 1 – 742 5570

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...