Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Authentication (User) Blog
Showing posts tagged with Security
Showing posts in English
sambit | 10 May 2013 | 0 comments

Symantec VIP added some new functionality in past few months.

VIP Third-Party Integrations

Symantec VIP provides almost 30 enterprise third party application plug-ins integrating seamlessly with industry standard VPNs, enterprise access manager and single sign on products, remote desktop access products, and end-point authentication modules over Windows, Linux and other UNIX platforms. In the past few months, we focused on enhancing console login experience with Windows Sever 2008 and Windows 7, enabled Microsoft NPS servers and Cisco ISE to authenticate with Symantec VIP, ensured Cisco Secure ACS 5.x compatibility with the VIP services.

  1. Microsoft Windows Server 2008 and Windows 7 – Microsoft Windows Console Login can be enhanced to integrate with custom security protocols like smart card, two factor authentication by developing credential provider modules. Symantec VIP Credential Provider for Windows has been providing strong...
chalcon | 22 Apr 2011 | 0 comments

facebook logo.jpg

This week Facebook announced the availability of new security features for its users. Two significant features of note are the always-on "HTTPS" secure sessions, as well as the availability of two-factor authentication (aka strong authentication).

The use of "HTTPS" by websites enables secure information transmission, which helps protect users when sharing or sending personal information online. Many popular websites have added the HTTPS (where the "S" at the end of HTTP stands for "secure") this year due in part to the availability of interception tools like Firesheep. The presence of an SSL...

nicolas_popp | 20 Apr 2011 | 0 comments

Last week, the White House announced its official National Strategy for Trusted Identities in Cyberspace (NSTIC). NSTIC is the largest-ever effort by the federal government and private sector partners (including Symantec) to develop a secure, standards-based and interoperable online identity system. The goal: Improve the security and privacy of online interactions and more effectively fight cybercrime. Today's announcement marks the culmination of two years of effort by VeriSign (first as an independent company and later as part of Symantec) to help bring this important initiative to life.

At the heart of NSTIC is the concept of an Identity Ecosystem based on trusted identity frameworks. Trusted identity frameworks are the lynchpin to...

chalcon | 15 Feb 2011 | 0 comments

RSA 2011.jpeg

The RSA Conference 2011 at the Moscone Center in San Francisco has officially kicked off and the VIP team is starting the week off strong. Our VeriSign Identity Protection (VIP) Authentication Service is part of several exciting announcements this week and below is a brief look at what's in the news.

Ping Identity Integrates VIP to Deliver Cloud-Based Authentication with Single Sign-On
Ping Identity announced that it has integrated VIP into its PingFederate identity federate suite. The PingFederate Integration kit for VIP creates a solution that enables enterprises to secure remote workers with strong authentication, while providing them a single online identity with single sign-on across both internal applications and almost every leading cloud application. The complete press release can be found...

chalcon | 09 Feb 2011 | 0 comments

intel.jpeg

Today Symantec announced that it has been selected by Intel to integrate our VeriSign Identity Protection (VIP) credential into the Intel Identity Protection Technology (IPT) platform, found in select 2nd generation Intel Core processors. You can find the complete press release here for full details.

The combination of VIP and Intel IPT creates a new class of strong authentication credential for PC users that is embedded into the Intel chipset. Now VIP and Intel IPT can help prevent...

chalcon | 02 Feb 2011 | 0 comments

Carbon image.jpeg

According to a recent story in SearchSecurity.com UK, the EU Emissions Trading System was recently suspended by the European Union following what was described as "recurring security breaches in national registries over the last two months." The thefts involved $38 million worth of carbon credits.

Bloomberg reported that the latest breach occurred at Prague-based Electricity Market Operator (OTE), a government owned energy trading platform where over $7 million worth of carbon credits had been stolen and sold in the open market.

The Bloomberg story also reported that the OTE was due to introduce...

nicolas_popp | 06 Sep 2010 | 1 comment

It is clear that high assurance identity on the internet is going to require identity proofing. With more than 1 Billion Web users, and 3 Billion mobile users increasingly connected to the Internet, scalability is going to be essential. If high assurance identities become the norm, digital identify verification services that do not require in-person proofing could therefore turn into a significant market opportunity

Most folks in the industry would tell you that credit bureaux, and financial institutions ought to be primary beneficiaries as the new business emerges. However, the convergence of Internet, mobile and telecommunication driven by iPhone and Android could attract new market players. Mobile network operators (MNOs) have a wealth of identifiable data about us. They are also uniquely positioned to bring to market multi-channel solution. In fact, an MNO-operated ID proofing service could easily support voice and web, for brick and mortar as well as online service...

nicolas_popp | 02 Jun 2010 | 0 comments

I have been involved with a couple similar initiatives around certification for identity and thought it would be interesting to explain the logic behind these efforts. The first initiative is led by the Open Identity Exchange and is based on the Open Identity stack. The second is more enterprise cloud focused; it is driven by the Cloud Security Alliance (CSA). The CSA is developing a more SAML-oriented technology blueprint within OASIS. The technology protocols are different but the risk controls are similar. Therefore, I am hopeful that both trust frameworks will converge (I will certainly try to help them converge).

But let us re-hash the motivation of the industry that sponsors these efforts. A trust framework is necessary to enable policy...

nicolas_popp | 10 May 2010 | 0 comments

When Achilles was a baby, the oracle predicted that he would die in battle from an arrow. Thetis, Achilles' mother who did not want her son to die decided to dip Achilles' body into the water of a river that would make him immortal. Unfortunately, Thetis had held Achilles by the heel which was not washed over by the magic water. Achilles grew up to be a Great War hero, whose apparent invincibility had turned him into a legend. But one day, an arrow shot at him was lodged in his heel, killing him instantly.

When it comes to consumer identity, Facebook looks more and more like the Achilles' of identity. Every day, it is growing more powerful and invincible. Yet, a growing stream of concerns is gradually exposing the social warrior's vulnerability to security and privacy. Nevertheless, as a website, Facebook...

vipmobile | 04 May 2010 | 0 comments

Han Dong, Senior Manager - Product Marketing, User Authentication

cloud_apps2.jpg

Thinking of moving your productivity apps to the cloud? Several tech-savvy folk like you have already deployed or are in various states of making the move to leverage an increasing number of enterprise productivity apps that live in the cloud. Just consider the benefits of cloud-apps:

  • Zero infrastructure investment / capital expenditure (for typical server & software installation, on-going care and feeding, etc.)
  • Quick-and-easy deployment and provisioning of applications (no need to install software on redundant servers or on every desktop), including multi-tenant (disparate organizations) sharing of pooled resources (of host CPUs, system failover,...