Cloud-Based Identity Management Gets Two-Factor Authentical from Verizon

Verizon enhanced its cloud-based identity-management service with new ways for enterprises to authenticate users and manage user access.

Verizon added support for more types of tokens and digital signing capabilities to its cloud-based Enterprise Identity Services to help businesses more securely authenticate corporate users, the company announced July 14. Verizon also expanded mobile support for smartphones and tablets running Android, BlackBerry and iOS platforms to allow organizations to implement two-factor authentication security.

The Verizon 2011 Data Breach Investigations Report found that log-in credentials were stolen in nearly half of the breaches in 2010, Tracy Hulver, director of products and marketing for identity solutions at Verizon, told eWEEK. The latest data breaches in 2011 are also following the trend, with attackers specifically targeting users for their user names and passwords, Hulver said. With the authentication information in hand, attackers can access corporate networks as a trusted insider.

"Stolen credentials are most often a means to an end but are increasingly an end in and of themselves," Verizon wrote in the report earlier this year.

With two-factor authentication, Verizon Enterprise Identity Services customers will be able to require employees to use the dynamic code that will be displayed on the mobile device along with the normal code to log in to the network. Incorporating intelligence such as the phone number and location will help validate that the person logging in is really the user, Hulver said. Organizations gain multiple ways to deliver the one-time password, such as a mobile application that generates one on the fly, having the server send it via Short Message Service to the mobile device, or using an interactive voice response system, without having to implement multiple systems, according to Hulver.

To read the original eWeek article, click here: Verizon Adds Two-Factor Authentication to Cloud-Based Identity Management

CIO Insight Staff
CIO Insight Staff
CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles