Welcome!

News Feed Item

Privakey Announces the End of Passwords

The Password-Free Revolution has Begun

PHILADELPHIA, PA--(Marketwired - September 22, 2016) - Privakey has announced the latest enhancement to their revolutionary cloud-based authentication service. Online services that subscribe to Privakey can now allow their users to login with a simple tap on their mobile device, or a click of their computer's mouse. No password needed!

Among the most dreaded tasks of internet users is the creation of still another username and password combination. Despite tremendous advances in technology, the problem with online authentication has been getting worse. The internet was designed without an identity layer, which forced all online businesses to build their own service for identifying and authenticating users. The resulting proliferation of inconsistent and insecure usernames, passwords, and "security" questions is a bane for users worldwide. Privakey decided that there has to be a better way. Users should have the ability to assert their identity in a secure and consistent manner across the web.

The company launched its revolutionary authentication service earlier this year, and has now enhanced it. Businesses that subscribe to Privakey can now improve their user's experience by eliminating passwords. Instead of asserting an insecure password, users simply tap the approve button when notified by the Privakey app. The user's approval asserts their identity, which is bound to a device that they either own or control. Privakey's simple "Tap-In" authentication approach is ideal for online businesses that aim to optimize the consumer experience and minimize transaction friction, without sacrificing security. An optimized and frictionless consumer experience is essential to the success of online retail businesses. Privakey's Tap-In approach is ideal for entertainment, retail, and social media sites.

Privakey's convenient and highly secure two-factor authentication (2FA) service is recommended for higher risks sites, such as banking and healthcare services. In addition to asserting control of a device (one factor), businesses can configure Privakey to have users assert a second factor of authentication, such as a PIN or a fingerprint. Privakey never stores a user PIN or fingerprint image, so they are not vulnerable to hackers. Privakey users select and manage their own PINs, so they can use the same PIN at every site that requires it. Fingerprint assertions work in the same manner as PIN assertions.

According to Privakey chief executive, Charles Durkin, "The release of the Tap-In authentication option is another step towards our long-term goal of eliminating passwords from online transactions. Users crave consistency, convenience, and security, and we deliver all three." In the coming years Privakey will be available at most popular consumer facing websites and mobile applications. Online service providers and mobile apps can enable Privakey by visiting the company website at: www.privakey.com.

ABOUT PRIVAKEY

PrivaKey, Inc. is an innovative leader in the drive to eliminate passwords from the Internet and online transactions. Privakey improves the user experience, enabling uniform and consistent login experiences at multiple sites. Consistent, convenient, and secure logins are enabled by the cloud-based Privakey service. Privakey is easy to enable on websites, mobile applications, and online services. It requires no upfront capital, and it works with devices that users already own. Passwords are going away and Privakey is leading the way.

Privakey is expected to be ubiquitous in the years ahead, relieving users from the burden of managing the complex and vulnerable passwords now used for online access. PrivaKey, Inc. was founded in 2016. It is a wholly owned subsidiary of Probaris Technologies, Inc.

Image Available: http://www.marketwire.com/library/MwGo/2016/9/22/11G115351/Images/TapInAuthentication-ad0ad15037af90bc98f0d833561aaf46.jpg
Image Available: http://www.marketwire.com/library/MwGo/2016/9/22/11G115351/Images/TwoFactorAuthentication-4da9bb60302d8efb909ded8dcf0eebeb.jpg

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...