|By Marketwired .||
|August 11, 2014 07:01 AM EDT||
IRVINE, CA -- (Marketwired) -- 08/11/14 -- SecureAuth Corporation today launched SecureAuth IdP 8.0, the first access control solution that incorporates risk-based authentication -- analyzing and stopping attackers before they breach your environment. This new functionality in IdP enhances the multi-factor authentication workflows that can be easily built and integrated with existing corporate resources and policies for cloud, mobile and desktop access.
"Major security breaches have stayed in the headlines in 2014. Even today we're hearing about attackers stealing user credentials to disrupt businesses and governments for financial gain -- it's clear that password-based security is not enough," stated Pete Lindstrom, Research Director, Security Products, at International Data Corporation (IDC) research and advisory firm. "It's imperative for organizations to incorporate more intelligent security measures at the point of user authentication to prevent intrusions, yet it is equally important to balance strong security with the frictionless experience that users demand."
SecureAuth IdP 8.0 risk-based authentication includes four criteria to deliver an accurate threat assessment including: IP address, IP reputation using threat intelligence powered by Norse Corporation's DarkMatter network, group membership and geo-location/geo-velocity. IdP authentication workflows can include all four of these criteria chained together or a subset. At each point of inspection, there are four actions that can be taken: pass, challenge, redirect or fail. To a legitimate user, this analysis is transparent, ensuring that their user experience is preserved.
"SecureAuth IdP 8.0 equips organizations with a process to detect threats and prevent unauthorized access to corporate resources before a security breach occurs," commented Keith Graham, Chief Technology Officer at SecureAuth Corporation. "It seems as if daily there are news reports about yet another company being hacked, user credentials stolen, and personal data compromised. These on-going attacks mean organizations must step up their attempts to block attackers before they can do damage. SecureAuth is working hard to help our customers address their authentication challenges in this ever changing cyber threat landscape"
SecureAuth IdP 8.0 additional features and benefits include:
- A transformation engine that dynamically changes user attributes to meet custom mapping needs, removing the need to store and retain custom attributes in the data store
- Two-factor authentication support for Windows desktops and servers which increases protection for Windows administrative and user accounts.
- Account provisioning and synchronization that eliminates the need to manually manage user data in multiple locations
- A visual configurator that speeds the creation of IdP authentication workflows making deployment even faster
More information about SecureAuth IdP 8.0 can be found at [http://www.secureauth.com/idp-8/] . SecureAuth is demonstrating the solution at the Gartner Catalyst Conference in San Diego August 11 - 13, booth 107.
SecureAuth is a technology leader providing access control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, read the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2654741
Dec. 7, 2016 05:15 AM EST Reads: 1,040
Dec. 7, 2016 04:00 AM EST Reads: 855
Dec. 7, 2016 02:00 AM EST Reads: 615
Dec. 7, 2016 01:45 AM EST Reads: 6,160
Dec. 7, 2016 01:15 AM EST Reads: 1,872
Dec. 7, 2016 01:00 AM EST Reads: 1,614
Dec. 7, 2016 12:45 AM EST Reads: 3,933
Dec. 7, 2016 12:45 AM EST Reads: 1,238
Dec. 7, 2016 12:15 AM EST Reads: 1,371
Dec. 7, 2016 12:15 AM EST Reads: 1,024
Dec. 7, 2016 12:00 AM EST Reads: 1,267
Dec. 7, 2016 12:00 AM EST Reads: 2,125
Dec. 6, 2016 11:45 PM EST Reads: 745
Dec. 6, 2016 10:15 PM EST Reads: 1,151
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Dec. 6, 2016 09:15 PM EST Reads: 349