A&S wanted to keep the complexity of an MFA solution to a minimum: “Installation was as simple as installing apps on workers’ mobile devices via QR code. Our workers need speedy and secure access to our network and to the … Continue reading
With so many companies offering free solutions to handle two-factor authentication (2FA), why on earth should anyone pay for a two-factor authentication solution? Facebook and Google offer basic 2FA functions, and of course, your bank and building society probably offer security … Continue reading
Good security should be secure, of course, but it should also be easy to use. If security becomes too cumbersome or difficult to use, then it either gets in the way of people doing their job, or it tempts them into finding … Continue reading
SecurEnvoy Channel News Update SecurEnvoy the trusted global leader of multi-device Tokenless® two-factor authentication (2FA) has today announced a strategic partner recruitment drive in line with the launch of SecurAccess v8.1.
SecurEnvoy makes Tokenless® two-factor authentication more relevant than ever. SecurEnvoy, the trusted global leader of multi-device Tokenless® two-factor authentication (2FA) has today further reduced the inconvenience of security with the launch of SecurAccess v8.1.
The recent discovery of a new strain of Android malware that can steal the login credentials of mobile banking users will have many financial institutions rushing to review how they protect their customers. The malware, detected by researchers at security … Continue reading
Keeping secrets secure has been an issue since early Inuit’s kept information from one tribe to another, so this isn’t a new phenomenon. What has changed is it’s no longer if data can be kept secret, it’s a question of … Continue reading
German IT Security authority ‘all-about-security’ interviewed Fabian Guter, SecurEnvoy’s EMEA Manager to understand more about the tokenless proposition. Click here for the Voice Interview. In a podcast-style presentation he is asking critical questions to his guests. In this interview, he … Continue reading
If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading
In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice. … Continue reading