Welcome!

IoT User Interface Authors: Elizabeth White, Carmen Gonzalez, XebiaLabs Blog, Liz McMillan, Doron Kolton

News Feed Item

NetAuthority Selected by ShareVault to Harden Device Authentication in Secure Document Sharing

Partnership Brings NetAuthority's Device Authentication to ShareVault's Enterprise Customers

SAN FRANCISCO, Feb. 26, 2013 /PRNewswire/ -- ShareVault, the leader in secure document sharing for enterprise applications, and NetAuthority, Inc., the leader in strong authentication solutions for trusted Internet-connected devices and transactions, announced today a customer and partner agreement for ShareVault to offer NetAuthority's advanced access control and identify verification capabilities to ShareVault's enterprise customers and partners.   

ShareVault enables corporations to maintain control of and protect critical information shared among internal users and third parties outside the corporate domain. Used to securely share documents and track their access, ShareVault reduces information leakage risk while enabling collaboration among internal and external groups with support for Windows, Macintosh and iPad devices. ShareVault is used for applications in the financial services, bioPharma life sciences, legal services, energy/natural resources and other industries for mergers and acquisitions, fund raising, distressed asset sales, litigation support, corporate compliance, partnering applications.

In addition, with its ShareVault for SharePoint offering, corporations can also create a separate environment to securely share selected information from multiple SharePoint sites with external parties. ShareVault integration with SharePoint requires no software modifications to SharePoint while allowing an independent layer of user permissions and real time tracking and audit trail reporting.

NetAuthority's capabilities will enhance ShareVault's advanced and proprietary security architecture and features for document sharing by adding powerful, patented device identification and authentication capabilities that irrefutably prove the identify of a device connecting to a ShareVault secure document sharing service. With NetAuthority's solution in place, devices, in addition to the users themselves, must prove their identity before accessing critical corporate data stored, managed, and shared from within ShareVault. With the end-to-end integrated solution, the device will be required to authenticate itself using a device key generated by NetAuthority that cannot be spoofed and can irrefutably identify and authenticate the device based on key characteristics, all of which is invisible to the user and does not require any manual interaction. The system prevents security breaches as well as provides zero-day protection against automated man-in-the-middle and man-in-the-browser attacks through irrefutable transaction verification.

Supporting Quotes:
Richard Andersen, ShareVault CEO, said:
"With NetAuthority's patented irrefutable device identification and authentication solution, we are building on our security model to mitigate another critical risk related to Internet-connected devices in the workplace: to ensure that only authorized users and verified devices can access, store and share critical company data and assets.  All this, without impacting the user-experience in working with ShareVault."

Chris Brennan, NetAuthority CEO and founder, said:
"We're excited to be working with ShareVault as both a customer and partner.  More and more companies are storing and managing critical and sensitive corporate data and assets in the cloud.  When this trend is coupled with the explosive growth in Internet-connected devices and escalating number of impersonation attacks to gain unauthorized access, it's increasingly clear that there is a significant need for device-centric strong authentication to mitigate these threats.  In implementing NetAuthority's solution, ShareVault, as a leader in secure document sharing and collaboration, will now be able to offer irrefutable device identification and authentication to protect its enterprise customers from today's rapidly-changing threat environment."

About NetAuthority
NetAuthority is the leader in strong authentication solutions for trusted Internet-connected devices and transactions. Our solution secures information and financial assets, assures user confidence that drives business, and protects assets and brand equity. NetAuthority's patented device-centric methods provide irrefutable accuracy with best in class security, ease of use and value. For more information, visit www.NetAuthority.com.

About ShareVault
ShareVault is a leader in secure document sharing cloud services for enterprise applications requiring centralized control and tracking of user access. Our solution reduces information leakage risk and supports collaboration across departments and external parties.  Customers have successfully used ShareVault for M & A, fund raising, corporate repository & compliance, distressed asset sales, IPO, litigation support and partnering applications. ShareVault is used in a variety of industries including financial services, bioPharma and life science, energy and natural resources, and legal services. For more information visit www.sharevault.com   

Media Contact:
Peggy Tierney
Nadel Phelan, Inc.
+1-831-440-2405
[email protected]

SOURCE NetAuthority, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...