Welcome!

News Feed Item

Easy Solutions Delivers Advanced Mobile Authentication

Easy Solutions, the Total Fraud Protection® company, today launched the latest version of its authentication solution, DetectID, which includes a new push authentication capability, providing banks with a superior out-of-band authentication and user experience. The new release of DetectID provides a framework for banks to leverage push notifications technology to enable bi-directional communications with customers to approve, on their phone, online activities such as login request, transaction request, or changes to their personal online profile. Additionally, with this technology integrated in mobile banking apps, banks also have an opportunity to transform their existing alerts offering from a reactive alert service to a proactive customer engagement service, where customers can instantly take action on an alert.

Push authentication is available as a software library for banks and enterprises to integrate into their own mobile applications for seamless authentication, or as a stand-alone mobile application. It’s currently supported for Apple iOS and Google Android.

According to a recently released report, global smartphone penetration surpassed 1 billion users in 2012 and will total 1.75 billion by the end of 2014. As of December of 2013, one in every five people in the world own a smartphone. This movement holds the promise for safer and more convenient authentication solutions compared to SMS One-Time Password (OTP) messages, which are not user-friendly, can be costly, may inhibit user adoption and even drive some users away. Easy Solutions DetectID with push authentication harnesses the smartphone native security architecture to secure the device and leverage it to authenticate customers in a way that minimizes user experience friction points and reduces two factor authentication costs.

“Mobile authentication represents a major challenge for banks as they seek to secure vulnerable end-points without compromising the end-user experience,” said Daniel Ingevaldson, CTO of Easy Solutions. “DetectID is setting a new standard in mobile banking by offering effortless mobile security and leveraging mobile banking applications to secure customers’ identity.”

DetectID with push authentication includes some of the following capabilities:

  • Hardened End-Point Security: Push authentication messages can only be sent to registered devices and are impossible to redirect, greatly reducing Man-in-the-Middle attacks and account takeovers. Push authentication also does not store any personal information and eliminates the possibility of SIM redirection attacks.
  • Improved End-User Experience: End users don’t need to wait for a One-Time Password (OTP) request, email, or any other type of inconvenient out-of-band authentication method to gain secure access to their banking app.
  • Multi-Channel Support: Push authentication is part of DetectID Authentication Framework which provides strong authentication methods for all banking channels. DetectID also integrates with legacy authentication schemes, enabling fast and simple migration.
  • Comprehensive APIs: DetectID includes comprehensive APIs for self-service management, including device provisioning and activation, as well as the management of the push notifications workflow.
  • Native SDK Support: Organizations can embed transparent authentication in their mobile application using the DetectID SDK. The SDK provides device authentication and push authentication technology from within a native application. By transparently embedding push authentication technologies, you can secure your customers’ identity without requiring them to download a third-party app.
  • Trusted Device with real-time mobile risk analytics and threat deactivation: Easy Solution SDK harnesses the unique value proposition of the Total Fraud Protection platform, which, in addition to push authentication provides key metrics and data intelligence from the device to make decisions on the transaction risk and extend proactive protection that detect and block threats. By securing the device first, organizations can securely leverage their customers’ mobile device for authentication.

Push authentication is also available with DetectID Cloud, which provides strong multi-factor authentication for cloud applications. The newest version of DetectID and DetectID Cloud are available immediately from Easy Solutions and its business partners worldwide. More information about DetectID can be found at: http://www.easysol.net/newweb/Products/DetectID

ABOUT EASY SOLUTIONS

Easy Solutions delivers Total Fraud Protection® to more than 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.

United States: 1401 Sawgrass Corporate Parkway, Sunrise, FL 33323. Tel. 1 (866) 524 4782

Latin America: Cra. 13A No. 98 – 21 Of. 401. Bogota, Colombia. Tel. +57 1 – 742 5570

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...