Networking

10:00 AM
Connect Directly
RSS
E-Mail
50%
50%

SecureAuth Rolls Out Multifactor Authentication, SSO For Smartphones

Enterprises can enable secure end user access via smartphones using the latest version of SecureAuth, which provides certificate-based two-factor authentication, single sign-on and identity management services. SecureAuth is also extending support for securing access to cloud-based applications. SecureAuth Identity Enforcement Platform (IEP) 6.0 extends the product's capabilities from desktops and laptops to iPhone/iPad and Android, as well as other mobile platforms. Mobile device users can be g

Enterprises can enable secure end user access via smartphones using the latest version of SecureAuth, which provides certificate-based two-factor authentication, single sign-on and identity management services. SecureAuth is also extending support for securing access to cloud-based applications. SecureAuth Identity Enforcement Platform (IEP) 6.0 extends the product's capabilities from desktops and laptops to iPhone/iPad and Android, as well as other mobile platforms. Mobile device users can be granted secure access to internal corporate and VPN resources, as well as authorized cloud applications.

The downloadable app enables strong authentication access based on SecureAuth's use of an X.509 certificate, provides SSO and authenticates the user to the corporate data store, typically Active Directory, mirroring the platform's capabilities for securing computer access.

"Mobile devices are a big issue for enterprises," says Steve Coplan, senior analyst, enterprise security practice at The 451 Group. "There are any number of vendors with mobile certificates, but it's how you manage the certificate that's important. How do you automate the process? How do you associate the certificate with a particular user so there's a one-to-one correlation between the user and device?"

IEP provides browser-based x.509 certificate authentication using the same crypto mechanism as PKI, but without requiring the enterprise to roll out PKI infrastructure. "It's similar to a cookie workflow," says Tom Stewart, SecureAuth CFO. "The certificate is mapped to the user and the enterprise, and, using the data store, the user name and password is used as a second factor." Coplan refers to the technology as the "anti-PKI PKI." 

IEP can leverage different protocols to allow the authentication to take place. So a user might be allowed access to a cloud service using SAML and then an internal resource, such as a SharePoint repository, using form-based authentication, without having to log in twice.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Cartoon
Hot Topics
7
VMware NSX Banks On Security
Marcia Savage, Managing Editor, Network Computing,  8/28/2014
4
Real-World SDN, Lesson 2: Conquer The Enemy Within
Symon Perriman, Senior Technical Evangelist, Microsoft,  8/25/2014
3
How To Survive In Networking
Susan Fogarty, Editor in Chief,  8/28/2014
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed