Blog Archives

Security; you choose – your device and your way!

Everybody hates passwords. People either have one that’s easy to guess (and therefore insecure), or one of those fiendishly complicate ones with lots of £, & and $ signs in that are impossible to remember. Either way, passwords present a … Continue reading

SecurEnvoy New Hire: Engineering Lead for the US

  SecurEnvoy, a leader in trusted authentication is excited to announce a key engineering hire in the US, Michael Urgero. With over 25 years’ experience in assisting enterprise class organizations achieve success in secure virtualization projects involving Citrix, VMware and … Continue reading

The role of SMS in user authentication

Online systems require a mechanism to ensure that whoever is accessing them is a legitimate user. For many systems, it is enough for users to enter their username and password to verify their identity. Security in such a situation can be … Continue reading

CS magazine reviews the latest SecurEnvoy version 8

Two factor authentication (2FA) is the only way forward for security-savvy businesses, as standard username and password combinations are now dangerously insecure. Computing Security reviews the new SecurEnvoy Version 8: SecurAccess impressed us with its superb range of 2FA features, which … Continue reading

Multi factor authentication doesn’t need to be hard

  There was a time when two-factor authentication was a major undertaking. New servers had to be installed, security tokens had to be purchased, distributed and registered to their owners and then Support desks had to be created to handle … Continue reading

Authentication of tomorrow

The merging of the organic and digital worlds is undoubtedly gathering pace. As humans, we are now huge consumers of technology, which has led to patience being a virtue for very few. However, this patience is being tested on a … Continue reading

Authentication just got even easier than using a password!

Our vision for the future has arrived; users can easily tap an NFC ready device, phone or wearable device to to authenticate themselves as the user! Imagine how easy that would be for moving cash or paying bills, for social media … Continue reading

Securing your Personal Entry Points

In recent years there has been a significant shift in an employee’s technology preferences at work, in part shaped by how they are using technology in their personal lives and the increasing trend for bring your own devices (BYOD). We are … Continue reading

Survival together in a business eco-system

How to build the biggest enterprise without actually making anything is the impossible dream. Yet look at the market! Once where ICI, IBM and Glaxo once stepped, these global operators with products to sell, are now replaced with corporations with … Continue reading

Helping to Secure the Future of German Car Design

A&S wanted to keep the complexity of an MFA solution to a minimum: “Installation was as simple as installing apps on workers’ mobile devices via QR code. Our workers need speedy and secure access to our network and to the … Continue reading

A world without tokens


Upcoming Events

To view more details on our events, Click Here

Contact Us | +44 (0) 845 2600010