Click here to close now.




















Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Daniel Khan, Gary Kaiser, Harry Trott

News Feed Item

ESET Secure Authentication: New Two-Factor Authentication (2FA) System Protects Passwords and Prevents Data Breaches

SAN DIEGO, Feb. 21, 2013 /PRNewswire/ -- ESET®, the leader in proactive digital protection, today announced the general availability of ESET Secure Authentication™, a two-factor authentication (2FA) software solution for small and medium businesses (SMBs). This simple and highly efficient application makes use of remote end-users' mobile devices to deliver a one-time password (OTP) when they connect to company networks, providing added security to the network and the device. ESET Secure Authentication is available immediately through the ESET North America partner network.

(Logo: http://photos.prnewswire.com/prnh/20121109/SF09648LOGO)

"The 2FA market represents a significant opportunity for ESET and for our network of ESET value-added resellers (VARs)," said Andrew Lee, CEO, ESET North America. "ESET Secure Authentication is simple to use, easy to administer and provides a critical layer of security for remote users. We believe the market for software-based authentication is healthy and growing, and we want to make sure SMB customers have access to critical security options that work the way they work."

According to a recent report by Frost & Sullivan, the global OTP market will approach US $1.1 billion by 2016 and the software OTP segment is growing at a compound annual growth rate (CAGR) of approximately 10.3 percent. Poor passwords and unsecured remote network access make every business a potential target and a potential customer. With millions of passwords compromised each year, many companies have already experienced data loss, damage to their reputations and decreased revenue. Cybercriminals don't just focus on the largest enterprises. As the threat landscape evolves, small businesses prove attractive targets.

"Criminal hacking is increasingly sophisticated and organized, and it is constantly growing in both scale and scope. What many smaller businesses don't realize is that they are an appealing target to cyber criminals—a tempting combination of opportunity, access, and potential return," said Stephen Cobb, security researcher, ESET North America. "If you're in business today and not employing multifactor protection on your systems, then you're putting your customers, your reputation and your livelihood at risk."

When customer information is on the line, passwords alone are not enough. A host of regulations compel businesses of every size to protect that information or face legal action which may include penalties, commerce restrictions and substantial fines. Examples of U.S. regulations that specifically require two-factor authentication include: Payment Card Industry Data Security Standards (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA); National Institute of Standards and Technology (NIST); Federal Financial Institutions Examination Council (FFIEC); the Gramm-Leach-Bliley Act (GLBA), also known as the U.S. Financial Modernization Act; and the Sarbanes-Oxley Act (SOX), which sets standards for all U.S. public company boards, management and pubic accounting firms. The list is long and growing, and underscores the importance that multi-factor authentication holds in the protection of customer information and key business data.

Designed to be very simple to install, easy to configure and convenient to manage, ESET Secure Authentication offers email protection for Outlook® Web Access/App (OWA) and connectivity protection for VPN customers who use RADIUS, the ubiquitous Remote Authentication Dial-In User Service networking protocol. Because the solution is both lightweight and readily administered, it provides SMB customers with a compelling total cost of ownership.

Product Availability

ESET Secure Authentication is immediately available in North America via authorized ESET resellers. The solution will be demonstrated during the upcoming RSA® Conference 2013 in San Francisco from February 25 through February 28, at booth #1638 in Moscone Center South. Following introduction in the U.S., the product will be released in select countries in Europe, Asia Pacific and Latin America.

Key Benefits

Automatic Configuration: Installation of the mobile application is designed to be simple and seamless, starting with a "double-click" installer. The user clicks on a link in a text message sent from ESET to their device. This automatically installs and activates the application. Text-based SMS messages are supported for users who cannot install, or have not yet installed, the mobile application. The application itself will be available for download via Google Play™, the Apple® App Store, BlackBerry® App World or directly from ESET provisioning servers.

Familiar Management Environment (MMC and ADUC snap-in): Windows® operating system administrators will value the familiar Active Directory Users & Computers management tool and snap-in integration with the Microsoft® Management Console (MMC).  ESET Secure Authentication is tested and supported on Windows® Server 2003, 2003 R2, 2008, 2008 R2 and 2012.

Broad Mobile Platform Support: ESET Secure Authentication utilizes users' mobile devices including iPhone®, Android™, BlackBerry®, Windows® Phone 7 and 8, Windows® Mobile, and J2ME-based devices.

Protection of Outlook Web Access/App Endpoints: OWA is integrated with ESET two-factor authentication via a native plug-in. The application prevents access to OWA until the user has successfully authenticated with their unique one-time password.

Protection of RADIUS Endpoints: RADIUS is the de-facto standard networking protocol for user authentication in the VPN market. RADIUS serves three functions: to authenticate users or devices before granting them access to a network, to authorize those users or devices for certain network services and to account for usage of those services.

The ESET logo and brand name are trademarks of ESET spol. s r.o. or ESET North America. All other trademarks are property of their respective owners.

About ESET

ESET® is on the forefront of proactive endpoint protection, delivering trusted security solutions to make the Internet safer for businesses and consumers. For over 25 years, ESET has led the industry in proactive threat detection and its award-winning NOD32® Antivirus technology has detected 100% of the WildList Organization "In-the-Wild" malware samples since testing began in 1998. ESET recently received a 75th VB100 award and consistently earns high ratings from AV-Comparatives, Virus Bulletin, AV-TEST and other independent testing organizations. ESET NOD32® Antivirus, ESET Smart Security®, ESET® Endpoint Solutions, ESET® Mobile Security and ESET® Cyber Security (solution for Mac) are trusted by millions of users and are among the most recommended security solutions in the world. IDC has recognized ESET as a top five corporate anti-malware provider.

ESET has global headquarters in Bratislava (Slovakia), with operations in San Diego (U.S.), Buenos Aires (Argentina) and Singapore; and offices in Sao Paulo (Brazil) and Prague (Czech Republic). ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Kosice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia) and an extensive partner network for more than 180 countries.

SOURCE ESET

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, d...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Architect for the Internet of Things and Intelligent Systems, described how to revolutionize your archit...
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of profound change in the industry.
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect their organization.
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducted a live demonstration of how quickly application development can happen when the need to comply wit...
There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industry. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee.
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Akana has released Envision, an enhanced API analytics platform that helps enterprises mine critical insights across their digital eco-systems, understand their customers and partners and offer value-added personalized services. “In today’s digital economy, data-driven insights are proving to be a key differentiator for businesses. Understanding the data that is being tunneled through their APIs and how it can be used to optimize their business and operations is of paramount importance,” said Alistair Farquharson, CTO of Akana.
Business as usual for IT is evolving into a "Make or Buy" decision on a service-by-service conversation with input from the LOBs. How does your organization move forward with cloud? In his general session at 16th Cloud Expo, Paul Maravei, Regional Sales Manager, Hybrid Cloud and Managed Services at Cisco, discusses how Cisco and its partners offer a market-leading portfolio and ecosystem of cloud infrastructure and application services that allow you to uniquely and securely combine cloud business applications and services across multiple cloud delivery models.
The enterprise market will drive IoT device adoption over the next five years. In his session at @ThingsExpo, John Greenough, an analyst at BI Intelligence, division of Business Insider, analyzed how companies will adopt IoT products and the associated cost of adopting those products. John Greenough is the lead analyst covering the Internet of Things for BI Intelligence- Business Insider’s paid research service. Numerous IoT companies have cited his analysis of the IoT. Prior to joining BI Intelligence, he worked analyzing bank technology for Corporate Insight and The Clearing House Payment...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world and it starts with business models and monetization strategies.
Converging digital disruptions is creating a major sea change - Cisco calls this the Internet of Everything (IoE). IoE is the network connection of People, Process, Data and Things, fueled by Cloud, Mobile, Social, Analytics and Security, and it represents a $19Trillion value-at-stake over the next 10 years. In her keynote at @ThingsExpo, Manjula Talreja, VP of Cisco Consulting Services, discussed IoE and the enormous opportunities it provides to public and private firms alike. She will share what businesses must do to thrive in the IoE economy, citing examples from several industry sectors.
In his keynote at 16th Cloud Expo, Rodney Rogers, CEO of Virtustream, discussed the evolution of the company from inception to its recent acquisition by EMC – including personal insights, lessons learned (and some WTF moments) along the way. Learn how Virtustream’s unique approach of combining the economics and elasticity of the consumer cloud model with proper performance, application automation and security into a platform became a breakout success with enterprise customers and a natural fit for the EMC Federation.
"Optimal Design is a technology integration and product development firm that specializes in connecting devices to the cloud," stated Joe Wascow, Co-Founder & CMO of Optimal Design, in this SYS-CON.tv interview at @ThingsExpo, held June 9-11, 2015, at the Javits Center in New York City.
SYS-CON Events announced today that CommVault has been named “Bronze Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. A singular vision – a belief in a better way to address current and future data management needs – guides CommVault in the development of Singular Information Management® solutions for high-performance data protection, universal availability and simplified management of data on complex storage networks. CommVault's exclusive single-platform architecture gives companies unp...
Electric Cloud and Arynga have announced a product integration partnership that will bring Continuous Delivery solutions to the automotive Internet-of-Things (IoT) market. The joint solution will help automotive manufacturers, OEMs and system integrators adopt DevOps automation and Continuous Delivery practices that reduce software build and release cycle times within the complex and specific parameters of embedded and IoT software systems.
"ciqada is a combined platform of hardware modules and server products that lets people take their existing devices or new devices and lets them be accessible over the Internet for their users," noted Geoff Engelstein of ciqada, a division of Mars International, in this SYS-CON.tv interview at @ThingsExpo, held June 9-11, 2015, at the Javits Center in New York City.
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.