Follow on Google News News By Tag * It Security * The Cloud * User Authentication * BYOD devices * Social Networks * Data Security * Identity Theft * More Tags... Industry News News By Location Country(s) Industry News
Follow on Google News | FrontOne Provides User Authentication, Secured Endpoint Access Control for The CloudFrontOne has introduced zero-knowledge, independent security platform that carries out unified dynamic authentication of identity control for insuring the security that is necessary for Cloud based applications and data storage..
By: Front One The success or failure of cloud service lies with its ability to protect the digital assets that users entrusted with it as well as their privacy. Cloud computing has fundamentally altered the traditional assumed-trust computing security model, as user further isolated from the command and control of their computing devices and data. FrontOne has introduced zero-knowledge, independent security platform that carries out unified dynamic authentication of identity control. Unlike a static identity which can be easily stolen, Dynamic Identity changes with every use. Dynamic Identity renders identities that are constantly changing. Continuous Mutual Authentication technology re-authenticates users periodically during sessions, defeating identity based attacks and mitigating insider and network based threats. User Centric security delivers data confidentiality by encrypting user data with a secured user specific security key. This process ensures secured application- JANUS is an innovative information security framework that provides strong authentication (ID sentry), client side UI protection and transaction integrity verification (Data Sentry). The core technology is “Message Dissemination” The complementary “Human Factor Authentication” 3AKey is a personal, unique and smart hardware security device that facilitates security related activity including server server authentication, task authorization as well as transaction signing, in effect locking out all others except for parties those authorized and directly engaged in the transaction. Data Sentry, provides support for end-to-end transaction security. Data Sentry consists of a communication agent that is randomly selected in every transaction and is dynamically configured to carry out client side and/or server side functions to verify the data integrity of transaction being performed by the user. This method of securing endpoint access control can dramatically change the ability to access data. As a result, reducing fraud and providing a new level of transactional and access control. For more information: Email info@frontone.com. Website: www.frontone.com # # # FrontOne has introduced a zero-knowledge security platform that provides a unified authentication service to meet the security and privacy needs of cloud infrastructures and other applications that have high security needs. End
Account Email Address Account Phone Number Disclaimer Report Abuse Page Updated Last on: Mar 18, 2012
|
|