Welcome!

AJAX & REA Authors: Andreas Grabner, Tim Hinds, Alfredo Diaz, Kevin Benedict, RealWire News Distribution

News Feed Item

The FIDO Alliance Announces FIDO Ready(TM) Certification and Authentication Products on Display at the 2014 International Consumer Electronics Show

FIDO Alliance Members Demonstrate Authentication Innovations to Audiences at CES

LAS VEGAS, NV and MOUNTAIN VIEW, CA -- (Marketwired) -- 12/19/13 -- CES -- The FIDO (Fast IDentity Online) Alliance (http://www.fidoalliance.org/), an industry consortium revolutionizing online authentication with the first standards-based specifications, today announced a FIDO Ready™ Certification program. At the 2014 International Consumers Electronics Show (CES), which is taking place in Las Vegas, NV from January 7-10, 2014, FIDO Alliance member organizations will display and demonstrate FIDO Ready™ and innovative authentication products from FIDO Alliance members. The industry, Relying Parties (RPs), and users everywhere have been anticipating innovative authentication products from FIDO Alliance members so they can begin to move away from prevailing password dependency, which has proven to be complex to manage and more susceptible to fraud. FIDO Alliance members will be demonstrating tested and certified FIDO Ready™ authentication innovations coming into the marketplace, along with other members' authentication innovations preparing to incorporate FIDO authentication standards into their products. FIDO authentication equips users of online, mobile, and point-of-sale applications to access sites and services and confirm transactions with better authentication that is more secure, private, and easy-to-use.

"In less than a year, FIDO Alliance specifications have enabled several of our members to produce some remarkable innovative authentication products. Participants at CES will benefit from hands-on experience of how open FIDO standards will work to enable truly novel strong authentication technologies. With FIDO specifications, users have a choice of devices and solutions that interoperate and make authentication easier to use, more secure and private," said FIDO Alliance president, Michael Barrett. "We congratulate our members on their timely work in delivering innovative authentication products to the marketplace and on display at CES."

FIDO Ready™ Products to Shine at CES
FIDO Alliance members participating with FIDO Ready™ products and services at CES include AGNITiO, FingerQ, Nok Nok Labs, Synaptics, and Yubico.

FIDO Alliance members will demonstrate FIDO Ready™ products that are based on working draft FIDO specifications, available to member organizations. These solutions have undergone an interoperability testing process against the draft specification, hosted by an independent testing organization and leveraging the Nok Nok Labs Multifactor Authentication Client and Server. CES demonstrations of FIDO Ready™ products will illustrate the clear value interoperable, more secure, private, and easier to use authentication devices and solutions can deliver to users.

Users are increasingly frustrated with having to manage and remember multiple passwords to access sites and services and confirm actions they take every day. FIDO innovations address a key pain point of online service providers, by reducing the risk that comes with having to manage users' passwords that are increasingly vulnerable to theft and fraud. Open FIDO authentication standards enable innovation in the development of authentication products and services, and deliver better authentication that overcomes the prevailing reliance on passwords. FIDO authentication is designed with a core focus on privacy -- all biometric and/or personally identifiable information (PII) stays local on the user's device and is not shared to the cloud or over the network.

  • When your Voice is Your Password

AGNITiO "Voice iD", among the first FIDO Ready™ solutions, replaces passwords in smartphones, laptops and more -- please see a demo at ShowStoppers on January 7 (table A-41). Voice iD is the natural way to secure your phone and any mobile device or application. Voice iD is the secure key that you always have with you; nothing is more natural than voice to authenticate on your phone and mobile devices. Passwords and PINs, as we use them today, are inconvenient and insecure. AGNITiO Voice iD performs all of a user's identification needs when mobile: authentication to devices and applications, as well as secure digital transactions.

  • Adapt Legacy Systems for Fingerprint Authentication with FIDO Ready™ Portable USB Biometric Device

FingerQ (WWTT.HK) will present PrivacQ Triangle, a collaboration between FIDO Alliance members FingerQ and Synaptics, which utilizes the FIDO Ready™ Validity "Natural ID" fingerprint sensor, enabling users to adapt their laptops and legacy devices with a small and portable touch fingerprint biometric. See PrivacQ Triangle at CES booths #70203 and #70205.

  • One secure key across multiple devices and services -- First U2F FIDO Ready Device™

Yubico YubiKey NEO enables secure single key log in from a mobile device or computer, to any number of online services, with a simple touch and with no client software needed. The product is an extension of the YubiKey invention, used by millions of users in 120 countries, and is the first authentication device to be U2F FIDO Ready™. See Yubico Tuesday, January 7 at CES ShowStoppers, Security booth C8 and on Wednesday, January 8, for a panel discussion on security from 5:30-6:30 PM inside the NXP Booth: Central Plaza #9.

FIDO Alliance Members Demonstrate Innovative Authentication at CES

Many FIDO Alliance members are working on incorporating the FIDO Alliance authentication standards into their products and will be showcasing these, including:

  • Use your Finger to Secure the Remote Control

CrucialTec, a FIDO Alliance Board member, will launch BTP Aero Mouse, a world-first remote control with embedded fingerprint scanner at CES. CrucialTec is collaborating with Nok Nok Labs to integrate its secure solution onto the remote control. The CrucialTec remote control will enhance security as well as simplify payments and usability, all with a simple swipe of a finger. The CrucialTec remote control with fingerprint recognition will give personalized access to one's favorite channels and also offer parental controls to lock TV channels using the "Kids Lock" feature. See a CrucialTec demo of BTP Aero Mouseat No.45022, LVH Exhibits PMA@CES.

  • Use your Secure Fingerprint in eCommerce Transactions -- Online and Mobile

EgisTec will present Yukey-eFIDO to give users universal authentication capabilities for securely logging onto web applications, e.g. eCommerce, mobile payments or wallets, replacing PINs or passwords with a user's fingerprints. Yukey-eFIDO cooperates with major trusted online parties to authorize transaction requests based on FIDO authentication protocols. In cooperation and collaboration with FIDO Alliance members, EgisTec leveraged hardware prototyping and agile software development to prepare YuKey-eFIDO for the markets. Continuing to advance with FIDO protocols, EgisTec, as a fingerprint sensor technology provider, will enrich the user experience with FIDO security and privacy built into their product offerings. See EgisTec and Yukey-eFIDO at CES, booth #72329, Hall D, Venetian, Level 2.

  • Using Your Iris to Authenticate You

Eyelock is a global leader in advanced iris-based identity authentication technology solutions. The company is changing the way identities and information are protected from theft and financial fraud. Established in 2006, EyeLock has built an extensive IP portfolio and broad suite of physical access control hardware and logical access control solutions. The company's software development kit (SDK) for embedding across OEM products and platforms extends EyeLock across logical applications by integrating the technology across devices and digital networks. Its solutions help meet critical needs across vertical industries spanning enterprise, education, financial services, public sector, retail, among others. See EyeLock at CES Digital Experience! on Jan. 6, 2014 from 7:00 p.m. to 11:30 p.m. and on the CES show floor, booth #10404.

  • Fingerprint reader for Android and Windows-based Mobile Devices

Fingerprint Cards (FPC). FPC will demonstrate its new touch fingerprint sensor FPC1020 for Android and Windows based devices in a private meeting space at the Las Vegas Trump International Hotel, including integration with Nok Nok Lab's Multifactor Server and Client for Android. Several members of FPC's executive management team will be present and available for appointment January 7-10. For appointment please contact charles.ng@fingerprints.com.

  • MicroSD card Adapts Mobile Phones and Laptops to become FIDO Ready™

GO-Trust FIDO microSD supports FIDO login and includes 8GB memory capacity for user storage. FIDO microSD will work with 99 percent of existing laptops and personal computers and the one billion Android devices in the marketplace and is intended to make devices FIDO Ready™. For enterprises and end users, microSD will soon be available at popular online merchants like eBay and Amazon. Demos of GO-Trust FIDO microSD can be seen at Infineon meeting suites at the Aria Hotel.

  • Hardware-based Root-of-Trust for Secure Identity Applications

Infineon Technologies announces its SLE97144SD Secure Element for embedded applications (eSE), which is used in the Go-Trust uSD card, and its SLB9660 TPM (Trusted Platform Module) and will show this at customer meetings during CES. As founding member of the FIDO Alliance, Infineon strongly focuses on the respective certifications in order to enable system providers a secure integration and management of online credentials. Infineon is committed to enabling millions of users of PCs, tablets and smartphones to securely authenticate themselves before executing online transactions. Infineon demos will be shown during scheduled meetings in our meeting suites at the Aria Hotel.

  • Protect Against Fraud with Pocket-sized Ultrasound Biometric Cyber-perimeter Defense

Sonavation AXISKEY™, on the leading edge of ultrasound biometrics, is a biometric key fob that safeguards consumers' personal and workplace accounts, online identities and transactions with a swipe of a finger. Replacing passwords, AXISKEY is a cost-effective personal cyber-perimeter defense system that is built on Sonavation's patented ultrasound impediography sensor platform. See AXISKEY at the CES Digital Experience! press event on January 6, 7:00 p.m. - 10:30 p.m. at the Mirage Hotel & Casino.

Meet FIDO Alliance Leaders at CES to Learn More about FIDO
NXP Happy Hour Event- Why Security Matters NXP will host an executive security event and feature FIDO Alliance with a talk by FIDO Alliance members on Wednesday, January 8, 2014 at 5.30 PM, Central Plaza 9 (CP9). The event will show that NXP's customers and partners take security and privacy seriously and to highlight why different industries feel it is important. Registration is required; email ces.2014@nxp.com to attend.

Synaptics Chief Evangelist, Biometrics Products Group, and FIDO Alliance founding board member, Sebastien Taveau will be speaking about the FIDO Alliance and FIDO specifications for implementation in user devices for consumer and enterprise applications. Synaptics will feature its entire portfolio of human interface solutions in a private meeting space, South Hall, MP25340, and Sebastien will be available by appointment only for discussions on Tuesday January 7 and Wednesday January 8, or as available. To arrange a meeting at CES, email sebastien.taveau@synaptics.com.

Open FIDO specifications will support a full range of authentication technologies for operating systems, including biometrics such as fingerprint and iris scanners, voice and facial recognition, as well as existing solutions and communications standards, such as Trusted Platform Modules (TPM), USB Security Tokens, embedded Secure Elements (eSE), Smart Cards, Bluetooth Low Energy (BLE), and Near Field Communication (NFC). The open specifications are being designed to be extensible and to accommodate future innovation. FIDO specifications allow the interaction of technologies within a single infrastructure, enabling security options to be tailored to the distinct needs of each user and organization.

About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:

Suzanne Matick
for FIDO Alliance
831-479-1888
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Cloud Expo Breaking News
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and security architects need to continue to develop a deep understanding about API security and how it differs from traditional web application security or mobile application security. In his session at 14th Cloud Expo, Sachin Agarwal, VP of Product Marketing and Strategy at SOA Software, will walk you through the various aspects of how an API could be potentially exploited. He will discuss the necessary best practices to secure your data and enterprise applications while continue continuing to support your business’s digital initiatives.
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud. In her session at 14th Cloud Expo, Courtney Behrens, Senior Marketing Manager at Brother International, will discuss how issues that had previously been out of your control, like performance, advanced administration and compliance, can now be put back behind your firewall.
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuity, speed, mobility, data access and connectivity are staples of the cloud and always will be. But cloud providers that plan to not only exist tomorrow – but to lead – know that security must be the top priority for the cloud and are delivering it now. In his session at 14th Cloud Expo, Kurt Hagerman, Chief Information Security Officer at FireHost, will detail why and how you can have both infrastructure performance and enterprise-grade security – and what tomorrow's cloud provider will look like.
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize their digital life through a brand new cloud service, starting from infrastructure to the users’ interface. A revolution that began from inventing and designing our very own infrastructure: we have created the first server network powered solely by ARM CPU. The microservers have “organism-like” features, differentiating them from any of the current technologies. Benefits include low consumption of energy, making Cynny the ecologically friendly alternative for storage as well as cheaper infrastructure, lower running costs, etc.
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardware, standards based APIs (ex. POSIX) and a strict adherence to layering and isolation between applications, daemons and kernel drivers/modules which allowed multiple types of development happen in parallel without hindering others. Put simply, today's server model is built on a consistent x86 platform with few surprises in its core components. A kernel abstracts away the platform, so that applications and daemons are decoupled from the hardware. In contrast, networking equipment is still stuck in the mainframe era. Today, networking equipment is a single appliance, including hardware, OS, applications and user interface come as a monolithic entity from a single vendor. Switching between different vendor'...
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo, Daniel Jacobson, Technology Manager at BUMI, will outline the key factors including backup configurations, proactive monitoring, data restoration, disaster recovery drills, security, compliance and data center resources. Aside from the technical considerations, the secret sauce in identifying the best vendor is the level of focus, expertise and specialization of their engineering team and support group, and how they monitor your day-to-day backups, provide recommendations, and guide you through restores when necessary.
Cloud scalability and performance should be at the heart of every successful Internet venture. The infrastructure needs to be resilient, flexible, and fast – it’s best not to get caught thinking about architecture until the middle of an emergency, when it's too late. In his interactive, no-holds-barred session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will dive into how to design and build-out the right cloud infrastructure.
You use an agile process; your goal is to make your organization more agile. What about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver on new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for application developers and slow performance for end users. Further, as data sizes grow into the Big Data realm, this problem is exacerbated and becomes even more difficult to address. A seemingly simple schema change can take hours (or more) to perform, and as requirements evolve the disconnect between existing data structures and actual needs diverge.
SYS-CON Events announced today that SherWeb, a long-time leading provider of cloud services and Microsoft's 2013 World Hosting Partner of the Year, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. A worldwide hosted services leader ranking in the prestigious North American Deloitte Technology Fast 500TM, and Microsoft's 2013 World Hosting Partner of the Year, SherWeb provides competitive cloud solutions to businesses and partners around the world. Founded in 1998, SherWeb is a privately owned company headquartered in Quebec, Canada. Its service portfolio includes Microsoft Exchange, SharePoint, Lync, Dynamics CRM and more.
The world of cloud and application development is not just for the hardened developer these days. In their session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, will pull back the curtain of the architecture of a fun demo application purpose-built for the cloud. They will focus on demonstrating how they leveraged compute, storage, messaging, and other cloud elements hosted at SoftLayer to lower the effort and difficulty of putting together a useful application. This will be an active demonstration and review of simple command-line tools and resources, so don’t be afraid if you are not a seasoned developer.
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based BUMI (Backup My Info!) is a premium managed service provider specializing in data backup and recovery. Founded in 2002, the company’s Here, There and Everywhere data backup and recovery solutions are utilized by more than 500 businesses. BUMI clients include professional service organizations such as banking, financial, insurance, accounting, hedge funds and law firms. The company is known for its relentless passion for customer service and support, and has won numerous awards, including Customer Service Provider of the Year and 10 Best Companies to Work For.
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected world, the enterprise needs to leverage the capabilities of the web and be ready to innovate without fear of DDoS attacks, concerns about application security and other threats. Organizations face great risk from increasingly frequent and sophisticated attempts to render web properties unavailable, and steal intellectual property or personally identifiable information. Layered security best practices extend security beyond the data center, delivering DDoS protection and maintaining site performance in the face of fast-changing threats.
From data center to cloud to the network. In his session at 3rd SDDC Expo, Raul Martynek, CEO of Net Access, will identify the challenges facing both data center providers and enterprise IT as they relate to cross-platform automation. He will then provide insight into designing, building, securing and managing the technology as an integrated service offering. Topics covered include: High-density data center design Network (and SDN) integration and automation Cloud (and hosting) infrastructure considerations Monitoring and security Management approaches Self-service and automation
In his session at 14th Cloud Expo, David Holmes, Vice President at OutSystems, will demonstrate the immense power that lives at the intersection of mobile apps and cloud application platforms. Attendees will participate in a live demonstration – an enterprise mobile app will be built and changed before their eyes – on their own devices. David Holmes brings over 20 years of high-tech marketing leadership to OutSystems. Prior to joining OutSystems, he was VP of Global Marketing for Damballa, a leading provider of network security solutions. Previously, he was SVP of Global Marketing for Jacada where his branding and positioning expertise helped drive the company from start-up days to a $55 million initial public offering on Nasdaq.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 14th Cloud Expo, Marc Jones, Vice President of Product Innovation for SoftLayer, will explain how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.