Welcome!

Machine Learning Authors: Dana Gardner, Jyoti Bansal, Peter Silva, Derek Weeks, Carmen Gonzalez

News Feed Item

NetAuthority Selected by ShareVault to Harden Device Authentication in Secure Document Sharing

Partnership Brings NetAuthority's Device Authentication to ShareVault's Enterprise Customers

SAN FRANCISCO, Feb. 26, 2013 /PRNewswire/ -- ShareVault, the leader in secure document sharing for enterprise applications, and NetAuthority, Inc., the leader in strong authentication solutions for trusted Internet-connected devices and transactions, announced today a customer and partner agreement for ShareVault to offer NetAuthority's advanced access control and identify verification capabilities to ShareVault's enterprise customers and partners.   

ShareVault enables corporations to maintain control of and protect critical information shared among internal users and third parties outside the corporate domain. Used to securely share documents and track their access, ShareVault reduces information leakage risk while enabling collaboration among internal and external groups with support for Windows, Macintosh and iPad devices. ShareVault is used for applications in the financial services, bioPharma life sciences, legal services, energy/natural resources and other industries for mergers and acquisitions, fund raising, distressed asset sales, litigation support, corporate compliance, partnering applications.

In addition, with its ShareVault for SharePoint offering, corporations can also create a separate environment to securely share selected information from multiple SharePoint sites with external parties. ShareVault integration with SharePoint requires no software modifications to SharePoint while allowing an independent layer of user permissions and real time tracking and audit trail reporting.

NetAuthority's capabilities will enhance ShareVault's advanced and proprietary security architecture and features for document sharing by adding powerful, patented device identification and authentication capabilities that irrefutably prove the identify of a device connecting to a ShareVault secure document sharing service. With NetAuthority's solution in place, devices, in addition to the users themselves, must prove their identity before accessing critical corporate data stored, managed, and shared from within ShareVault. With the end-to-end integrated solution, the device will be required to authenticate itself using a device key generated by NetAuthority that cannot be spoofed and can irrefutably identify and authenticate the device based on key characteristics, all of which is invisible to the user and does not require any manual interaction. The system prevents security breaches as well as provides zero-day protection against automated man-in-the-middle and man-in-the-browser attacks through irrefutable transaction verification.

Supporting Quotes:
Richard Andersen, ShareVault CEO, said:
"With NetAuthority's patented irrefutable device identification and authentication solution, we are building on our security model to mitigate another critical risk related to Internet-connected devices in the workplace: to ensure that only authorized users and verified devices can access, store and share critical company data and assets.  All this, without impacting the user-experience in working with ShareVault."

Chris Brennan, NetAuthority CEO and founder, said:
"We're excited to be working with ShareVault as both a customer and partner.  More and more companies are storing and managing critical and sensitive corporate data and assets in the cloud.  When this trend is coupled with the explosive growth in Internet-connected devices and escalating number of impersonation attacks to gain unauthorized access, it's increasingly clear that there is a significant need for device-centric strong authentication to mitigate these threats.  In implementing NetAuthority's solution, ShareVault, as a leader in secure document sharing and collaboration, will now be able to offer irrefutable device identification and authentication to protect its enterprise customers from today's rapidly-changing threat environment."

About NetAuthority
NetAuthority is the leader in strong authentication solutions for trusted Internet-connected devices and transactions. Our solution secures information and financial assets, assures user confidence that drives business, and protects assets and brand equity. NetAuthority's patented device-centric methods provide irrefutable accuracy with best in class security, ease of use and value. For more information, visit www.NetAuthority.com.

About ShareVault
ShareVault is a leader in secure document sharing cloud services for enterprise applications requiring centralized control and tracking of user access. Our solution reduces information leakage risk and supports collaboration across departments and external parties.  Customers have successfully used ShareVault for M & A, fund raising, corporate repository & compliance, distressed asset sales, IPO, litigation support and partnering applications. ShareVault is used in a variety of industries including financial services, bioPharma and life science, energy and natural resources, and legal services. For more information visit www.sharevault.com   

Media Contact:
Peggy Tierney
Nadel Phelan, Inc.
+1-831-440-2405
[email protected]

SOURCE NetAuthority, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
"Splunk basically takes machine data and we make it usable, valuable and accessible for everyone. The way that plays in DevOps is - we need to make data-driven decisions to delivering applications," explained Andi Mann, Chief Technology Advocate at Splunk and @DevOpsSummit Conference Chair, in this SYS-CON.tv interview at @DevOpsSummit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"Logz.io is a log analytics platform. We offer the ELK stack, which is the most common log analytics platform in the world. We offer it as a cloud service," explained Tomer Levy, co-founder and CEO of Logz.io, in this SYS-CON.tv interview at DevOps Summit, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software securi...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here