news


SecureAuth Debuts Threat Service

PRESS RELEASE — IRVINE, Calif. – June 9, 2016SecureAuth Corporation, the leader in adaptive access control, today announced the release of SecureAuth Threat Service. The new service continuously provides a real-time watchtower and shield on the risks targeting customer resources from across the globe. Leveraging threat information from a network of 11 million advanced threat sensors, the service determines whether an IP address is associated with known bad actors or anonymity infrastructure.

SecureAuth Threat Service customers can detect and protect against attacks while ensuring authorized users maintain access. Beyond simply providing that the IP Address is “bad”, SecureAuth Threat Service provides context around the IP Address such as the attack type and classification of the threat actor(s) and infrastructure involved – helping security staff better understand attack vectors and prevent access.{ad}

SecureAuth Threat Service:

  •        Combines multiple threat feeds to provide unprecedented coverage and protection against today’s multifaceted threat landscape including the Advanced Persistent Threat (APT), as well as Cyber Crime and Hacktivism
  •        Enhances a customer’s ability to identify compromised credentials before allowing access by determining whether an authentication request is coming from a known bad IP address or anonymity network
  •        Reduces response time by cutting through the noise and identifying compromised accounts for the Security Operations Center (SOC) staff and incident response team
  •        Uses the most reliable and accurate IP geo-location data available, mapping all routable IP addresses worldwide
  •        SecureAuth Threat Service is one of 6 advanced adaptive techniques providing an intricate web of risk checks that make it nearly impossible for attackers to penetrate

Looking for more on security? Click here for access to our report, “IoT: Why It Won’t Succeed Without the Channel,” for a rundown of the three must-have pillars of a profitable IoT program and the security considerations intrinsic to each element.”

“While many companies may have some form of threat service in use today, these services are often times not linked to whether or not somebody with valid credentials coming from a known suspicious origin are allowed to access critical organizational resources,” said Stephen Cox, chief security architect at SecureAuth. “Recognizing the value behind actionable, contextual data as a critical risk factor in an adaptive access solution, SecureAuth Threat Service uses threat information to cover a wide spectrum of attacks, irrespective of their motivation. As a result, organizations can thwart in-process attacks and prevent them from becoming the next headline.”

During authentication, SecureAuth IdP combines Threat Service information with other risk factors, including organization-provided IP whitelists and blacklists, device recognition data, behavioral biometrics, geo-location, group membership and other attributes. Depending on the risk, SecureAuth can require a multi-factor authentication method to verify identity, can deny the request outright, or simply pass the user on to their destination. Customers can use this authentication-specific information to reduce incident response and remediation times.

For more information on SecureAuth Threat Service, join the webcast on June 29th 2016: Unmask Anonymous Attackers with Advanced Threat Intelligence

About SecureAuth
SecureAuth is the leader in adaptive access control solutions, empowering organizations to determine identities with confidence. SecureAuth® IdP provides authentication security, Single Sign-On and user self-service tools together in a single platform, allowing strong identity security while minimizing disruptions to the end-user. SecureAuth IdP is currently protecting over five million users worldwide. For the latest insights on adaptive access control, follow the SecureAuth blog, follow @SecureAuth on Twitter and on LinkedIn, or visit www.secureauth.com.


Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Polls

Which vertical market holds the most promise for channel partners?

View Results

Loading ... Loading ...
The ID is: 51396