Welcome!

Machine Learning Authors: Yeshim Deniz, Elizabeth White, Zakia Bouachraoui, Pat Romanski, Liz McMillan

News Feed Item

SecureAuth First to Deliver Risk Analysis Combined With Multi-Factor Authentication and Single Sign On in One Solution

SecureAuth IdP 8.0 Introduces Live Threat Intelligence and Other Risk Analysis to Their Access Control Solution for Mobile, Cloud and Enterprise Applications

IRVINE, CA -- (Marketwired) -- 08/11/14 -- SecureAuth Corporation today launched SecureAuth IdP 8.0, the first access control solution that incorporates risk-based authentication -- analyzing and stopping attackers before they breach your environment. This new functionality in IdP enhances the multi-factor authentication workflows that can be easily built and integrated with existing corporate resources and policies for cloud, mobile and desktop access.

"Major security breaches have stayed in the headlines in 2014. Even today we're hearing about attackers stealing user credentials to disrupt businesses and governments for financial gain -- it's clear that password-based security is not enough," stated Pete Lindstrom, Research Director, Security Products, at International Data Corporation (IDC) research and advisory firm. "It's imperative for organizations to incorporate more intelligent security measures at the point of user authentication to prevent intrusions, yet it is equally important to balance strong security with the frictionless experience that users demand."

SecureAuth IdP 8.0 risk-based authentication includes four criteria to deliver an accurate threat assessment including: IP address, IP reputation using threat intelligence powered by Norse Corporation's DarkMatter network, group membership and geo-location/geo-velocity. IdP authentication workflows can include all four of these criteria chained together or a subset. At each point of inspection, there are four actions that can be taken: pass, challenge, redirect or fail. To a legitimate user, this analysis is transparent, ensuring that their user experience is preserved.

"SecureAuth IdP 8.0 equips organizations with a process to detect threats and prevent unauthorized access to corporate resources before a security breach occurs," commented Keith Graham, Chief Technology Officer at SecureAuth Corporation. "It seems as if daily there are news reports about yet another company being hacked, user credentials stolen, and personal data compromised. These on-going attacks mean organizations must step up their attempts to block attackers before they can do damage. SecureAuth is working hard to help our customers address their authentication challenges in this ever changing cyber threat landscape"

SecureAuth IdP 8.0 additional features and benefits include:

  • A transformation engine that dynamically changes user attributes to meet custom mapping needs, removing the need to store and retain custom attributes in the data store
  • Two-factor authentication support for Windows desktops and servers which increases protection for Windows administrative and user accounts.
  • Account provisioning and synchronization that eliminates the need to manually manage user data in multiple locations
  • A visual configurator that speeds the creation of IdP authentication workflows making deployment even faster

More information about SecureAuth IdP 8.0 can be found at [http://www.secureauth.com/idp-8/] . SecureAuth is demonstrating the solution at the Gartner Catalyst Conference in San Diego August 11 - 13, booth 107.

About SecureAuth
SecureAuth is a technology leader providing access control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, read the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2654741

Media Contact:
Gina Ray, APR
Ray Public Relations
[email protected]
+ 1 949-370-0941

Investor Contact:
Thomas C. Stewart
Chief Financial Officer
SecureAuth
[email protected]
+ 1 949-777-6959

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, and even backup/DR. We'll review available APIs and conduct live demonstrations of integrations and the automating common IT tasks.
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offerings) are something most have no idea as to what it means and how you utilize it. Where is the "Stamp of Approval" or "Stamp of Legitimacy" on some of these Bitcoin websites (how do you know you are not dealing with a scammer?)
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).