Blog Archives

Adaptive Two-factor Authentication: An Easy Solution for CIOs?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been … Continue reading

Hackers are powerless with zero knowledge 

Every day hackers are being equipped for their next attack, as more and more users are trusting organisations with their personal information online. But with zero knowledge, hackers can be rendered powerless.

SecurEnvoy Launches Free Security Assessment to Combat the Increased Frequency and Severity of Corporate Security Breaches

SecurEnvoy Calls for Government, Healthcare and Financial Services Companies to Strengthen Internal Security with Two-factor Authentication (2FA). SecurEnvoy; the trusted global leader of mobile phone based Tokenless® two-factor authentication (2FA) has launched a unique security assessment for businesses in line with … Continue reading

5 Seconds to Protect Businesses

It is also important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. … Continue reading

The rising cost of data breaches brings the birth of the authentication blueprint

Once only considered for high-end companies (e.g., banks), today companies large and small in the government, healthcare, energy, financial services, insurance, manufacturing, marketing, retail, telecommunications, charity, legal and construction sectors are turning to two-factor authentication (2FA) for their internal security … Continue reading

Can Eyeprint ‘selfies’ replace hardware tokens?

Eyeprints – of veins in the white, not the iris of an eye – captured via selfie are another biometric option for 2-factor security, but concerns about the implications of compromise remain. Andy Kemshall, co-founder and technical director at SecurEnvoy, … Continue reading

Why Your Employees Need To Be In Control In A Mobile World

It makes sense to put employees in control in a world where almost everyone possesses a mobile device. By empowering staff to protect their endpoints, giving them the ability to authenticate their way on their own phone or tablets, IT … Continue reading

SecurEnvoy’s NFC tech could make your Apple Watch your password

SecurEnvoy’s NFC tech could make your Apple Watch your password. No need to type in a lengthy phrase – just use your smartwatch or phone as an NFC key. Stuff magazine looks at SecurEnvoys oneswipe technology 

Knowledge is power to the hacker

Every day hackers are being equipped for their next attack, as more and more users are trusting organisations with their personal information online. But with zero knowledge, hackers can be rendered powerless.

Sophos integration continues with end user protection

Three years after the first integration with Sophos, so the very latest version is now available. With this news follows the partnership with Sophos partner of the year Foursys. Alongside Cyberoam and Astaro, the end-point protection has also been worked … Continue reading



A world without tokens

Authentication Live Demo

application-demo Try a 2FA Log-In

Free 30 Day Trial

application-demo Get Your Trial

Request a Call Back

Request a Call Back Request a Call Back

Blog

Upcoming Events

To view more details on our events, Click Here

Contact Us

info@SecurEnvoy.com | +44 (0) 845 2600010