Granular controls added to 4TRESS by ActivIdentity

Powered by SC Magazine
 

ActivIdentity has added granular authentication controls to its 4TRESS product.

ActivIdentity has added granular authentication controls to its 4TRESS product.

The company said it has added features in 4TRESS to enable control over which operating system is used in a particular environment and version control within that OS, so a user can enable the usage of a soft token running on an up-to-date iOS but disable access from the soft token running on an older iOS, or any other iteration.

It has also added software version reports to give users the ability see how many end-users they have from any type of operating system, or even the version of the soft token used.

Julian Lovelock, vice president of product marketing at ActivIdentity, part of HID Global, said that as more enterprise and commerce workers use their personal smartphones and tablets in the workplace, the ability to control those devices and secure organisational data becomes an unaddressed pain point.

According to the company, 4TRESS provides multi-layered versatile strong authentication for enterprises looking to secure access conveniently and cost-effectively. This update enables soft token one-time password (OTP) solutions to be controlled based on the type of OS and the version of the soft token.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1391

Vote