<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SecurEnvoy FR</title>
	<atom:link href="http://www.securenvoy.fr/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.securenvoy.fr</link>
	<description></description>
	<lastBuildDate>Wed, 24 Apr 2013 09:16:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>SecurEnvoy East Coast Office opens</title>
		<link>http://www.securenvoy.fr/securenvoy-east-coast-office-opens/</link>
		<comments>http://www.securenvoy.fr/securenvoy-east-coast-office-opens/#comments</comments>
		<pubDate>Thu, 14 Feb 2013 07:18:13 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1418</guid>
		<description><![CDATA[Expanding operations across all continents; SecurEnvoy opens a new office in the USAs East Coast. With financial results now published SecurEnvoy grows its pressence in the USA further with more expansion planned. Against an industry backdrop of reducing revenues and job &#8230; <a href="http://www.securenvoy.fr/securenvoy-east-coast-office-opens/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Expanding operations across all continents; SecurEnvoy<a href="http://www.securenvoy.com/mic_images/new-img/contact/newyork.jpg"><img class="alignright" src="http://www.securenvoy.com/mic_images/new-img/contact/newyork.jpg" alt="" width="219" height="164" /></a> opens a new office in the USAs East Coast.</p>
<p>With financial results now published SecurEnvoy grows its pressence in the USA further with more expansion planned.</p>
<p>Against an industry backdrop of reducing revenues and job losses, SecurEnvoy expand and continues recruiting and expanding. <span id="more-1418"></span>This office in New York (373 Park Ave South, New York, NY 10016) is SecurEnvoy&#8217;s commitment to the region and expansion on the East Coast.</p>
<p>As the remote access market accepts the tokenless invention that SecurEnvoy brought to market over ten years ago, so more new clients join to enjoy the savings, speed of deployment and reduced management overhead that tokenless two factor authentication provides.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/securenvoy-east-coast-office-opens/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>AEP &amp; SecurEnvoy create the secure solution for remote access users</title>
		<link>http://www.securenvoy.fr/aep-securenvoy-create-the-secure-solution-for-remote-access-users/</link>
		<comments>http://www.securenvoy.fr/aep-securenvoy-create-the-secure-solution-for-remote-access-users/#comments</comments>
		<pubDate>Tue, 12 Feb 2013 07:19:48 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1398</guid>
		<description><![CDATA[SecurEnvoy and Ultra Electronics AEP Networks joint initiative on Tokenless® mobile phone authenticated remote access from any device SecurEnvoy and AEP Networks have combined their SecurAccess mobile phone based tokenless® two-factor authentication and LanProtect™ corporate remote access technologies and domain &#8230; <a href="http://www.securenvoy.fr/aep-securenvoy-create-the-secure-solution-for-remote-access-users/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><strong>SecurEnvoy and Ultra Electronics AEP Networks joint initiative on Tokenless</strong><em>®</em><strong> mobile phone authenticated remote access from any device</strong></p>
<p>SecurEnvoy and AEP Networks have combined their<a href="http://www.securenvoy.com/blog/2011/01/19/sit-back-and-let-securenvoys-msps-take-the-strain/se-relax-in-the-cloud/" rel="attachment wp-att-393"><img class="alignright size-thumbnail wp-image-393" title="SE-relax-in-the-cloud" src="http://www.securenvoy.com/blog/wp-content/uploads/2011/01/se-relax-in-the-cloud-150x150.jpg" alt="" width="150" height="150" /></a> <em>SecurAccess</em> mobile <em>phone based <a href="http://www.securenvoy.com/two-factor-authentication/hardware-tokens-vs-tokenless.shtm">tokenless® two-factor authentication</a> and LanProtect™ corporate remote access technologies and domain experience to create a simple and highly secure solution for remote access users</em>.</p>
<p><span id="more-1398"></span>Passwords aren’t strong enough to protect company data from the other three billion users online. <a href="http://www.securenvoy.com/two-factor-authentication/why-use-two-factor-authentication.shtm">Two factor authentication </a>provides the strength of security needed, but usually requires managing tokens. By leveraging something the user already has, their mobile phone, SecurEnvoy’s <em>SecurAccess</em> allows a seamless and cost effective solution for two factor authentication to be implemented.</p>
<p>Whether your applications are running on a mix of Windows 2003, 2008, Citrix XenApp, XenDesktop, VMware View, Web Servers, 3270 Mainframes, or other server types, AEP Networks’ LanProtect™ solution can publish any application to any client device, including iPad and Android tablets, with powerful user-based access control. Powered by the mature Netilla® operating system and part of the Ultra Protect product line that also includes cloud-based remote access services, LanProtect™ has been implemented globally by both mid-to-large enterprise customers as well as government agencies.</p>
<p><em>“Having a strategic relationship with SecurEnvoy will allow both companies to work together offering what the marketplace really requires in authentication.  I am sure that working with SecurEnvoy will provide a strong and lasting partnership and provide a unique offering to customers globally”</em></p>
<p><strong><em> </em>Daniel Mothersdale VP Global Sales &amp; Marketing</strong></p>
<p><a href="http://www.securenvoy.com/integrationguides/aep.pdf">&lt;more&gt;</a></p>
<p><strong>About SecurEnvoy:</strong></p>
<p>SecurEnvoy is the trusted global leader of Tokenless® two-factor authentication. SecurEnvoy lead the way as pioneers of mobile phone based Tokenless® authentication.</p>
<p>Their innovative approach to the Tokenless® market now sees millions of users benefitting from their solutions all over the world. With users deployed across five continents, their customers benefit from significant reduced time to deploy and a zero footprint approach means there is no remote software deployment and administrators enjoy the management tools allowing them to rapidly deploy up to 100,000 users per hour.</p>
<p>With its channel centric approach, SecurEnvoy continues to expand its revenue and profitability year on year with customers in Banking, Finance, Insurance, Government, Manufacturing, Marketing, Retail, Telecommunications, Charity, Legal and Construction.</p>
<p>Headquartered in Theale, UK.</p>
<div></div>
<p>&nbsp;</p>
<p><strong>About AEP Networks:</strong></p>
<p>AEP Networks offers world leading technology that allows IT departments to connect their end users to their corporate applications as securely and reliably as possible. These solutions are designed to not only provide high levels of security but are the fastest to implement and offer the most flexible licensing options for cloud-based infrastructures. Users that connect to their corporate applications using Virtual Desktop Infrastructures (VDI) such as Citrix, VMWare or Microsoft Terminal Services are increasingly requesting to connect using a wide variety of devices such as their home PCs, public PCs in airports and even tablets. While these devices can significantly increase overall user productivity, they present a significant security and compliance risk for organisations.</p>
<p>Headquartered in Loudwater, UK.</p>
<div></div>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/aep-securenvoy-create-the-secure-solution-for-remote-access-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A quarter of a million Twitter users have had their accounts compromised this weekend!</title>
		<link>http://www.securenvoy.fr/a-quarter-of-a-million-twitter-users-have-had-their-accounts-compromised-this-weekend/</link>
		<comments>http://www.securenvoy.fr/a-quarter-of-a-million-twitter-users-have-had-their-accounts-compromised-this-weekend/#comments</comments>
		<pubDate>Mon, 04 Feb 2013 11:50:10 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1383</guid>
		<description><![CDATA[A quarter of a million Twitter users have had their accounts compromised in the latest of a string of high-profile internet security breaches. Twitter&#8217;s information security director Bob Lord said about 250,000 users&#8217; passwords had been stolen, as well as &#8230; <a href="http://www.securenvoy.fr/a-quarter-of-a-million-twitter-users-have-had-their-accounts-compromised-this-weekend/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><strong>A quarter of a million <a href="https://twitter.com/#!/securenvoy">Twitter</a> users have<a href="http://www.securenvoy.com/blog/2013/02/04/a-quarter-of-a-million-twitter-users-have-had-their-accounts-compromised-this-weekend/twitter/" rel="attachment wp-att-526"><img class="alignright size-full wp-image-526" title="twitter" src="http://lab1.securenvoy.com/blog/wp-content/uploads/2011/06/twitter.png" alt="" width="32" height="32" /></a> had their accounts compromised in the latest of a string of high-profile internet security breaches.</strong></p>
<p>Twitter&#8217;s information security director Bob Lord said about 250,000 users&#8217; passwords had been stolen, as well as usernames, emails and other data.<span id="more-1383"></span></p>
<p>Affected users have had passwords invalidated and have been sent emails informing them.</p>
<p>The quandary however is you still have to be careful! If you get hold of one of these emails because, it could equally be a phishing attack, it could be someone pretending to be Twitter which in turn makes this situation even worse!</p>
<p>After the event it&#8217;s always too easy to point and suggest how this could have been avoided, but its still the case that proving the identity of the user is paramount. Using two factor authentication is the only way to insure the user is who they say they are. Its our opinion, as the inventors of tokenless authentication, to suggest the quickest, easiest and cheapest route is by using what you already have in your pocket &#8211; your mobile/cell phone. An <a href="http://www.securenvoy.com/two-factor-authentication/token-types.shtm">SMS sent to your mobile, or using our app on a smart device or even a voice call to a landlin</a>e, combined with a username and password the user already has, together provides the authentication needed to prove their identity in our online age.</p>
<p>&nbsp;</p>
<p><a href="http://www.securenvoy.com/blog/">More</a></p>
<p>&nbsp;</p>
<p><strong><a href="http://www.bbc.co.uk/news/technology-21304049">http://www.bbc.co.uk/news/technology-21304049</a></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/a-quarter-of-a-million-twitter-users-have-had-their-accounts-compromised-this-weekend/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Nature&#8217;s way of keeping us on our toes?</title>
		<link>http://www.securenvoy.fr/natures-way-of-keeping-us-on-our-toes/</link>
		<comments>http://www.securenvoy.fr/natures-way-of-keeping-us-on-our-toes/#comments</comments>
		<pubDate>Fri, 18 Jan 2013 14:57:02 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[emergency authentication]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1379</guid>
		<description><![CDATA[As the bush fires spread across Queensland and fears of Victoria in NSW also being hit, we see conversely in Europe the snow has hit and brings countries to a stand still! In both Northern and Southern hemispheres emergencies arise &#8230; <a href="http://www.securenvoy.fr/natures-way-of-keeping-us-on-our-toes/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>As the bush fires spread across Queensland and fears of <a href="http://www.securenvoy.com/blog/2011/11/23/top-5-technology-trends-for-2012/businessman-consulting-glowing-crystal-ball/" rel="attachment wp-att-741"><img class="alignright size-thumbnail wp-image-741" title="Businessman Consulting Glowing Crystal Ball" src="http://lab1.securenvoy.com/blog/wp-content/uploads/2011/11/istock_000012041842xsmall-150x150.jpg" alt="" width="150" height="150" /></a>Victoria in NSW also being hit, we see conversely in Europe the snow has hit and brings countries to a stand still!</p>
<p>In both Northern and Southern hemispheres emergencies arise and more often than not, unexpectedly.</p>
<p>This season we know the risk <span id="more-1379"></span>of disasters more than most other times of the year and yet it always hits us as a surprise and a period of stunned numbness hits a nation. Whether that’s getting emergency supplies to a disaster area, rebuilding broken infrastructure or getting food on the shelf; in every region we seem to get caught out!</p>
<p>In our industry we brought a product to market, <a href="http://www.securenvoy.com/products/securice/overview.shtm">SecurICE,</a> (ICE relating to ‘in case of emergency’) to assist businesses and organizations to plan ahead – almost an insurance policy – ready for the ‘known unknown’ to strike. We know it will strike, we just don’t know when and by how much?</p>
<p>Don’t wait until the next occurrence comes along and catches you out again, make emergency access available for all workers and allow them to work from wherever its safe. Escape the flood, the bush fire or bad weather and work where its safest. It really isn’t expensive and does get the message to the recipients that they should stay away, they should be safe and work remotely.</p>
<p>We believe if you can send instructions, <a title="Find out more about Out of Band with SecurEnvoy's glossary" href="http://www.securenvoy.com/support/glossary.shtm#o">out of band (OOB)</a> to a recipient with details of  why they should stay away from the office, how to access remotely and then add the two factor authentication code to this message; then remote access can work anytime. The end user simply clicks onto the link they are sent, provides their usual username and password and then to prove its them, use the 6 digit code that was provided in the message to gain secure remote access; quickly and easily.</p>
<p>For more information of the SecurEnvoy innovation <a href="http://www.securenvoy.com/products/securice/overview.shtm">SecurICE click here</a>.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/natures-way-of-keeping-us-on-our-toes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Analysts Gartner reviewed vendors in the two factor authentication market and acknowledged SecurEnvoy as ‘one to watch’</title>
		<link>http://www.securenvoy.fr/analysts-gartner-reviewed-vendors-in-the-two-factor-authentication-market-and-acknowledged-securenvoy-as-one-to-watch/</link>
		<comments>http://www.securenvoy.fr/analysts-gartner-reviewed-vendors-in-the-two-factor-authentication-market-and-acknowledged-securenvoy-as-one-to-watch/#comments</comments>
		<pubDate>Mon, 14 Jan 2013 08:30:01 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[gartner]]></category>
		<category><![CDATA[gartner review]]></category>
		<category><![CDATA[reviews]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1368</guid>
		<description><![CDATA[Smartphones and tablets are changing the landscape for how authentication is best performed in the enterprise. The phone-as-a-token authentication method is well-established as an alternative to legacy one-time password (OTP) hardware tokens for consumer-facing Web applications and corporate remote access. Although some enterprises &#8230; <a href="http://www.securenvoy.fr/analysts-gartner-reviewed-vendors-in-the-two-factor-authentication-market-and-acknowledged-securenvoy-as-one-to-watch/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Smartphones and tablets are changing the landscape for <a href="http://www.securenvoy.com/blog/2011/07/18/securenvoy-releases-new-app-to-revolutionize-two-factor-authentication/new-app-to-revolutionise/" rel="attachment wp-att-597"><img class="alignright size-thumbnail wp-image-597" src="http://lab1.securenvoy.com/blog/wp-content/uploads/2011/07/new-app-to-revolutionise-150x150.png" alt="Gartner reviews SecurEnvoy " width="150" height="150" /></a>how authentication is best performed in the enterprise. The phone-as-a-token authentication method is well-established as an alternative to legacy <a href="http://www.securenvoy.com/two-factor-authentication/what-is-2fa.shtm">one-time password (OTP)</a> hardware tokens for consumer-facing Web applications and corporate remote access.</p>
<p>Although some enterprises elect to implement <a href="http://www.securenvoy.com/two-factor-authentication/hardware-tokens-vs-tokenless.shtm">multifactor authentication</a> based <span id="more-1368"></span>on their own risk analysis, others implement it because a regulatory standard or compliance objective has mandated multifactor authentication.</p>
<p>Mobile devices have become, for some people, an inseparable appendage in their lives. For others, it&#8217;s a common personal and business tool that travels most places easily. The wide acceptability and abundance of mobile devices are key reasons for their consideration as an <a href="http://www.securenvoy.com/two-factor-authentication/soft-tokens-explained.shtm">authentication token</a>.</p>
<p>A key factor driving adoption of phone-as-a-token methods among business buyers is the measurable cost savings they can offer, which reduces the cost of tokens, distribution, provisioning and maintenance.</p>
<p>SecurEnvoy focuses its efforts on OOB methods of authentication, using both SMS and smartphone-based applications to enable the phone as a token for a wide variety of mobile devices.</p>
<p>This low-touch approach to authentication allows for rapid onboarding of new devices and user self-management of replacement devices.</p>
<p>References: *Gartner, Inc., Market Trends: The Impact of Mobile Computing on User Authentication, Eric Ahlm, Ant Allan, August 29, 2012.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/analysts-gartner-reviewed-vendors-in-the-two-factor-authentication-market-and-acknowledged-securenvoy-as-one-to-watch/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tokenless Authentication Comes to the Cloud as SecurEnvoy partners with PasswordBank</title>
		<link>http://www.securenvoy.fr/tokenless-authentication-comes-to-the-cloud-as-securenvoy-partners-with-passwordbank/</link>
		<comments>http://www.securenvoy.fr/tokenless-authentication-comes-to-the-cloud-as-securenvoy-partners-with-passwordbank/#comments</comments>
		<pubDate>Thu, 10 Jan 2013 07:09:40 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>

		<guid isPermaLink="false">http://www.securenvoy.com/blog/?p=1360</guid>
		<description><![CDATA[London (UK) 10th January 2013: SecurEnvoy, the inventor of tokenless® authentication, today announced that it has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers will be able to access cloud &#8230; <a href="http://www.securenvoy.fr/tokenless-authentication-comes-to-the-cloud-as-securenvoy-partners-with-passwordbank/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><strong>London (UK) 10<sup>th</sup> January 2013: </strong>SecurEnvoy, <a href="http://www.securenvoy.com/blog/2011/08/23/have-you-been-hacked-this-month/istock_000014659905xsmall/" rel="attachment wp-att-654"><img class="alignright size-thumbnail wp-image-654" title="iStock_000014659905XSmall" src="http://lab1.securenvoy.com/blog/wp-content/uploads/2011/08/istock_000014659905xsmall-150x150.jpg" alt="passwords are too weak" width="150" height="150" /></a>the inventor of tokenless® authentication, today announced that it has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering.</p>
<p>Customers will be able to access cloud solutions, such as Google Apps, Office365 and Salesforce.com,<span id="more-1360"></span> through PasswordBank’s single-sign-on platform, using SMS messages for two-factor authentication. This partnership delivers business-grade security, without requiring users to carry a physical token at all times.</p>
<p>Steve Watts, Sales Director of SecurEnvoy, said, “A major benefit of <a href="http://www.securenvoy.com/products/securcloud/overview.shtm">cloud technology</a> is that it frees employees from their workstations, and gives them access to the tools they need, wherever they are and whenever they need it. Knowing how important security is, many companies implement <a href="http://www.securenvoy.com/support/glossary.shtm#s">two-factor authentication </a>to ensure that they always know who is accessing their systems at any time. But forcing users to carry tokens around with them (and not letting them login if they don’t have them) defeats the point. By combining the freedom of using SMS messages as the second factor, with the flexibility of the cloud, suddenly workers really do have the freedom they need.”</p>
<p>Dennis Lee, VP of Technology from PasswordBank said, “We have enabled two-factor authentication with tokens for some time, but our clients are starting to demand solutions that are cheaper to implement and deliver more flexibility. By offering the <a href="http://www.securenvoy.com/support/glossary.shtm#s">tokenless solution from SecurEnvoy</a>, we can meet the demands from our customers – and we can implement it with our current systems easily.”</p>
<p><strong>What is two factor authentication?</strong></p>
<p><a href="http://youtu.be/vf4h4j_KReE">Two factor authentication (2FA)</a> is a way of verifying a person is who they say they are. It requires the combination of two out of three possible factors – something you know – so a username, password or PIN; something you have – a credit card or token, and something you are – fingerprint. The combination of a username and password does not constitute 2FA as it is two types of the same factor.</p>
<p>Authentication tokens, first used over 20 years ago, generate a one time passcode (OTP) which can be entered as part of a 2FA process. They are different to PIN numbers, which are static, as they change every time and will expire within a set time. However, unlike the original physical tokens of the 80s, today OTPs can be generated by apps on a smartphone or sent via SMS making their use not only easy, but also practical.</p>
<p><strong>ENDS</strong></p>
<p><strong></strong></p>
<p><strong>About SecurEnvoy</strong></p>
<p>SecurEnvoy is the trusted global leader and inventor of <a href="http://www.securenvoy.com/">Tokenless® </a>two-factor authentication. SecurEnvoy leads the way as the pioneer of mobile phone based Tokenless® authentication. SecurEnvoy’s innovative approach to the Tokenless® market now sees thousands of users benefitting from the solutions all over the world. With users deployed across five continents, customers benefit from significant reduced time to deploy, and a zero footprint approach means there is no remote software deployment and administrators enjoy the management tools allowing them to rapidly deploy up to 100,000 users per hour.</p>
<p>With its channel centric approach, SecurEnvoy continues to expand its revenue and profitability year on year with customers in Banking, Finance, Insurance, Government, Manufacturing, Marketing, Retail, Telecommunications, Charity, Legal, and Construction. Its partners include, Sophos Astaro, Juniper, Citrix, Fortinet, Sonic Aventail, Cisco, Checkpoint, Microsoft, F5 and others.</p>
<p>For more information on SecurEnvoy please visit <a href="http://www.securenvoy.com/">www.securenvoy.com</a></p>
<p>&nbsp;</p>
<p><strong>About PasswordBank</strong></p>
<p>PasswordBank provides a unique Identity-as-a-Service (IDaaS) platform, a new approach for secure access to corporate identity in today’s complex and hybrid IT environments (Cloud and On-premise). PasswordBank IDaaS platform provides Identity and Access Management (IAM), Federated Identity, Hybrid Single Sign-On (Enterprise and Web SSO) and Privileged User Management delivering the solution in three modes (SaaS, On-Premise and Hybrid) for Mac, Windows and Linux users.</p>
<p>PasswordBank is headquartered in Silicon Valley with customers and offices in North America, Europe, Asia and Latin America. The company has a partnership with Oracle as its E-SSO Partner for Non-Windows platforms.</p>
<p>For more information, visit <a href="http://www.passwordbank.com/">www.passwordbank.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/tokenless-authentication-comes-to-the-cloud-as-securenvoy-partners-with-passwordbank/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What is the Value of Customer Credentials?</title>
		<link>http://www.securenvoy.fr/what-is-the-value-of-customer-credentials/</link>
		<comments>http://www.securenvoy.fr/what-is-the-value-of-customer-credentials/#comments</comments>
		<pubDate>Wed, 02 Jan 2013 14:10:51 +0000</pubDate>
		<dc:creator>SecurEnvoy</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>

		<guid isPermaLink="false">http://lab1.securenvoy.com/blog/?p=1315</guid>
		<description><![CDATA[Last month, organisations received an enormous wake-up call – news of the largest cyber-attack ever on a state government in the US. While the fact that breaches still occur is almost to be expected, it’s the magnitude of what the &#8230; <a href="http://www.securenvoy.fr/what-is-the-value-of-customer-credentials/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><em>Last month, organisations received an enormous wake-up call<a href="http://www.securenvoy.com/blog/2011/11/08/the-rising-tide-of-automated-attacks-is-something-that-cannot-be-ignored-for-much-longer-as-there-is-a-real-risk-of-these-attack-vectors-resulting-in-a-successful-major-incursion-on-a-larger-scale/image017/" rel="attachment wp-att-731"><img class="alignright size-thumbnail wp-image-731" title="image017" src="http://lab1.securenvoy.com/blog/wp-content/uploads/2011/11/image017-150x150.jpg" alt="" width="150" height="150" /></a> – news of the largest cyber-attack ever on a state government in the US. While the fact that breaches still occur is almost to be expected, it’s the magnitude of what the criminals stand to make from the data stolen that beggars belief. Is there any way to stop criminals profiting from our information?<span id="more-1315"></span></em></p>
<p><em></em>For anyone that missed it, the South Carolina state computer system hack is notable for the volume of data – 3.6m social security numbers plus 387,000 credit plus debit card credentials – that were stolen. Cybercriminals can use this data to create cloned payment cards, apply for credit, and even open bank accounts in the victim’s name. While on the face of it that might seem limited, when you work out that with a conservative $3.00 rate per set of card information stolen, the cybercriminals stand to make more than a million dollars simply for selling on the credentials they stole is this single haul.</p>
<p>The sad reality is that attacks on third-party credentials &#8211; which can be used in identity theft frauds &#8211; are fast becoming a global cybercriminal commodity business.</p>
<p><strong>What went wrong? </strong>Fundamentally, the computer system was left unprotected. According to reports, the perpetrator first infiltrated the Department of Revenue computers in August, snooped around a couple of times, and then simply downloaded the records. And it’s as simple as that!</p>
<p>Criminals are patient creatures. They’ll conduct reconnaissance missions, from the safety of their lair, using an automated set of hacking tools to probe likely IP addresses on the Internet. Once they’ve identified an inadequately protected gateway, they’ll sneak in, scout around, and they’re off with the goods. A bit like a cat burglar but with less risk of detection and often far greater rewards.</p>
<p>It would be wonderful to say that attacks of this nature are rare but unfortunately that simply isn’t true. In the US 11 state tax agencies have experienced breaches since 2005. And of course it’s not just the tax agencies that have been breached as numerous US government agencies have also been breached. And it’s not just the US as the UK’s NHS has itself lost 1.8 million sets of patient records in the last year alone. What it all means is there is a big question mark hanging over the security of government systems.</p>
<p><strong>What can be done? </strong>The fact that government – at both local and national levels – is short of money in these straightened times means the problem can’t be solved whatever the cost. That’s the sad reality. Instead organisations need to introduce effective security precautions.</p>
<p>Databases, and the gateways they hide behind, are typically opened with simple credentials – the combination of a user name and password. We’ve said this before but it’s worth reiterating that automated password cracking software can perform 100 million checks per second – that equates to a four character password being cracked in 0.16 seconds; a six character password in 11.4 minutes; and an eight character password in just 32 days. Industry opinion is that this is vastly inadequate.</p>
<p>The long and short of it is organisations are duty bound to add a decent level of security. Fundamentally this is two things – decent encryption and industry standard two factor authentication (2FA).</p>
<p>The security foundation stone is 2FA as all security systems sit on top. If you can’t verify the identity of the person gaining access, given that they can be anyone on the internet, then everything else is superfluous.</p>
<p><a href="http://www.securenvoy.com/animations/overview/animations.shtm">True 2FA</a> is the combination of two, of a possible three, elements:</p>
<ul>
<li>Something you know – such as a pin or password</li>
<li>Something you own – such as a key, token or the chip embedded in a credit card</li>
<li>Something specific to the person – such as a fingerprint, or retina</li>
</ul>
<p>It’s worth clarifying at this point that entering certain characters from a memorable phrase does not constitute 2FA &#8211; it’s still something you know, albeit a little more complex.</p>
<p>Conversely, while something specific to the person – or biometrics as it’s widely referred – is considerably more foolproof, it requires hardware, which often makes this element a non-starter.</p>
<p>It’s not surprising, therefore, that when introducing 2FA, it is the first two elements that are the most common combination employed. In the real world we regularly use Chip and Pin to make a purchase in the high street, or withdraw cash from an ATM. Quite simply this is 2FA in action in the real world.</p>
<p>That said, it’s important to remember that not all 2FA systems are the same. Clever companies have realised that it’s the end user who is ultimately in control and are introducing systems that allow organisations to offer strong authentication with end user flexibility. Any device that can be connected to the internet can act as an authentication token &#8211; an SMS on a mobile, an app on a Smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.</p>
<p>This is what is referred called <a href="http://www.youtube.com/watch?v=vf4h4j_KReE&amp;feature=share&amp;list=UU3jutZnRCQU9jlxcC12b7iw">‘tokenless’ two-factor authentication (2FA)</a>, such as that offered by SecurEnvoy’s SecurAccess solution, and it secures an IT interaction with `something you have’ (the handset) and `something you know’ (the challenge authentication data) across an easy-to-use system (the mobile network.)</p>
<p>Implementing <a href="http://www.securenvoy.com/products/securaccess/overview.shtm">tokenless 2FA</a> is a very easy and low-cost way of securing access to large data repositories in the public sector, both with employees and members of the public, where appropriate. With every practically every pocket now containing a mobile phone, the chances of a user not having their ‘token’ with them at the point of entry is unlikely.</p>
<p>While we might not be able to stop criminals looking for data, especially when it’s such a valuable commodity, organisations have a responsibility not to make it easy for them.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.securenvoy.fr/what-is-the-value-of-customer-credentials/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
