Granular controls added to 4TRESS by ActivIdentity

Powered by SC Magazine
 

ActivIdentity has added granular authentication controls to its 4TRESS product.

ActivIdentity has added granular authentication controls to its 4TRESS product.

The company said it has added features in 4TRESS to enable control over which operating system is used in a particular environment and version control within that OS, so a user can enable the usage of a soft token running on an up-to-date iOS but disable access from the soft token running on an older iOS, or any other iteration.

It has also added software version reports to give users the ability see how many end-users they have from any type of operating system, or even the version of the soft token used.

Julian Lovelock, vice president of product marketing at ActivIdentity, part of HID Global, said that as more enterprise and commerce workers use their personal smartphones and tablets in the workplace, the ability to control those devices and secure organisational data becomes an unaddressed pain point.

According to the company, 4TRESS provides multi-layered versatile strong authentication for enterprises looking to secure access conveniently and cost-effectively. This update enables soft token one-time password (OTP) solutions to be controlled based on the type of OS and the version of the soft token.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


 
 
 
Top Stories
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 989

Vote