Welcome!

Java IoT Authors: Mano Marks, Elizabeth White, Liz McMillan, Mehdi Daoudi, Kevin Benedict

News Feed Item

ESET Secure Authentication: New Two-Factor Authentication (2FA) System Protects Passwords and Prevents Data Breaches

SAN DIEGO, Feb. 21, 2013 /PRNewswire/ -- ESET®, the leader in proactive digital protection, today announced the general availability of ESET Secure Authentication™, a two-factor authentication (2FA) software solution for small and medium businesses (SMBs). This simple and highly efficient application makes use of remote end-users' mobile devices to deliver a one-time password (OTP) when they connect to company networks, providing added security to the network and the device. ESET Secure Authentication is available immediately through the ESET North America partner network.

(Logo: http://photos.prnewswire.com/prnh/20121109/SF09648LOGO)

"The 2FA market represents a significant opportunity for ESET and for our network of ESET value-added resellers (VARs)," said Andrew Lee, CEO, ESET North America. "ESET Secure Authentication is simple to use, easy to administer and provides a critical layer of security for remote users. We believe the market for software-based authentication is healthy and growing, and we want to make sure SMB customers have access to critical security options that work the way they work."

According to a recent report by Frost & Sullivan, the global OTP market will approach US $1.1 billion by 2016 and the software OTP segment is growing at a compound annual growth rate (CAGR) of approximately 10.3 percent. Poor passwords and unsecured remote network access make every business a potential target and a potential customer. With millions of passwords compromised each year, many companies have already experienced data loss, damage to their reputations and decreased revenue. Cybercriminals don't just focus on the largest enterprises. As the threat landscape evolves, small businesses prove attractive targets.

"Criminal hacking is increasingly sophisticated and organized, and it is constantly growing in both scale and scope. What many smaller businesses don't realize is that they are an appealing target to cyber criminals—a tempting combination of opportunity, access, and potential return," said Stephen Cobb, security researcher, ESET North America. "If you're in business today and not employing multifactor protection on your systems, then you're putting your customers, your reputation and your livelihood at risk."

When customer information is on the line, passwords alone are not enough. A host of regulations compel businesses of every size to protect that information or face legal action which may include penalties, commerce restrictions and substantial fines. Examples of U.S. regulations that specifically require two-factor authentication include: Payment Card Industry Data Security Standards (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA); National Institute of Standards and Technology (NIST); Federal Financial Institutions Examination Council (FFIEC); the Gramm-Leach-Bliley Act (GLBA), also known as the U.S. Financial Modernization Act; and the Sarbanes-Oxley Act (SOX), which sets standards for all U.S. public company boards, management and pubic accounting firms. The list is long and growing, and underscores the importance that multi-factor authentication holds in the protection of customer information and key business data.

Designed to be very simple to install, easy to configure and convenient to manage, ESET Secure Authentication offers email protection for Outlook® Web Access/App (OWA) and connectivity protection for VPN customers who use RADIUS, the ubiquitous Remote Authentication Dial-In User Service networking protocol. Because the solution is both lightweight and readily administered, it provides SMB customers with a compelling total cost of ownership.

Product Availability

ESET Secure Authentication is immediately available in North America via authorized ESET resellers. The solution will be demonstrated during the upcoming RSA® Conference 2013 in San Francisco from February 25 through February 28, at booth #1638 in Moscone Center South. Following introduction in the U.S., the product will be released in select countries in Europe, Asia Pacific and Latin America.

Key Benefits

Automatic Configuration: Installation of the mobile application is designed to be simple and seamless, starting with a "double-click" installer. The user clicks on a link in a text message sent from ESET to their device. This automatically installs and activates the application. Text-based SMS messages are supported for users who cannot install, or have not yet installed, the mobile application. The application itself will be available for download via Google Play™, the Apple® App Store, BlackBerry® App World or directly from ESET provisioning servers.

Familiar Management Environment (MMC and ADUC snap-in): Windows® operating system administrators will value the familiar Active Directory Users & Computers management tool and snap-in integration with the Microsoft® Management Console (MMC).  ESET Secure Authentication is tested and supported on Windows® Server 2003, 2003 R2, 2008, 2008 R2 and 2012.

Broad Mobile Platform Support: ESET Secure Authentication utilizes users' mobile devices including iPhone®, Android™, BlackBerry®, Windows® Phone 7 and 8, Windows® Mobile, and J2ME-based devices.

Protection of Outlook Web Access/App Endpoints: OWA is integrated with ESET two-factor authentication via a native plug-in. The application prevents access to OWA until the user has successfully authenticated with their unique one-time password.

Protection of RADIUS Endpoints: RADIUS is the de-facto standard networking protocol for user authentication in the VPN market. RADIUS serves three functions: to authenticate users or devices before granting them access to a network, to authorize those users or devices for certain network services and to account for usage of those services.

The ESET logo and brand name are trademarks of ESET spol. s r.o. or ESET North America. All other trademarks are property of their respective owners.

About ESET

ESET® is on the forefront of proactive endpoint protection, delivering trusted security solutions to make the Internet safer for businesses and consumers. For over 25 years, ESET has led the industry in proactive threat detection and its award-winning NOD32® Antivirus technology has detected 100% of the WildList Organization "In-the-Wild" malware samples since testing began in 1998. ESET recently received a 75th VB100 award and consistently earns high ratings from AV-Comparatives, Virus Bulletin, AV-TEST and other independent testing organizations. ESET NOD32® Antivirus, ESET Smart Security®, ESET® Endpoint Solutions, ESET® Mobile Security and ESET® Cyber Security (solution for Mac) are trusted by millions of users and are among the most recommended security solutions in the world. IDC has recognized ESET as a top five corporate anti-malware provider.

ESET has global headquarters in Bratislava (Slovakia), with operations in San Diego (U.S.), Buenos Aires (Argentina) and Singapore; and offices in Sao Paulo (Brazil) and Prague (Czech Republic). ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Kosice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia) and an extensive partner network for more than 180 countries.

SOURCE ESET

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.