Granular controls added to 4TRESS by ActivIdentity

Powered by SC Magazine
 

ActivIdentity has added granular authentication controls to its 4TRESS product.

ActivIdentity has added granular authentication controls to its 4TRESS product.

The company said it has added features in 4TRESS to enable control over which operating system is used in a particular environment and version control within that OS, so a user can enable the usage of a soft token running on an up-to-date iOS but disable access from the soft token running on an older iOS, or any other iteration.

It has also added software version reports to give users the ability see how many end-users they have from any type of operating system, or even the version of the soft token used.

Julian Lovelock, vice president of product marketing at ActivIdentity, part of HID Global, said that as more enterprise and commerce workers use their personal smartphones and tablets in the workplace, the ability to control those devices and secure organisational data becomes an unaddressed pain point.

According to the company, 4TRESS provides multi-layered versatile strong authentication for enterprises looking to secure access conveniently and cost-effectively. This update enables soft token one-time password (OTP) solutions to be controlled based on the type of OS and the version of the soft token.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 626

Vote