Blog Archives

Sophos integration continues with end user protection

Three years after the first integration with Sophos, so the very latest version is now available. With this news follows the partnership with Sophos partner of the year Foursys. Alongside Cyberoam and Astaro, the end-point protection has also been worked … Continue reading

Are smartphones ‘leaking’ YOUR fingerprints?

Are smartphones ‘leaking’ YOUR fingerprints? Flaw means hackers can intercept and steal biometric data !! Fingerprint scanners are often touted as the future of security and an alternative to the notoriously flawed password. But experts have discovered they may not … Continue reading

2015: The Year the Password Becomes Obsolete?

This year the password will likely become a thing of the past. Surprising? Not really. As hacks increase, so will the ways to prevent them. Two-factor authentication is emerging as a more secure approach in which companies across all industries … Continue reading

The Chinese way isn’t to gamble on the Horses, it’s to take the safer option

It’s the Chinese New Year today, the 31st January 2104 and what a year it is to be! In the West there are early signs of recovery following the past six year period of decline. In China however, its been … Continue reading

Only once in a blue moon

So the IT Manager is safe in the knowledge, as s/he’s tucked up in bed, that all is well at the office! And yet if we were to stop and ask who has access to the network, to the office … Continue reading

Security experts flee the RSA Conference – signs of increased sensitivity with regard to the NSA scandal

Appearances can be deceptive: The interest in the NSA scandal, and the resulting reactions, have not ceased, even if the media is now reporting about them less (prominently). It was recently announced that a number of IT security experts had … Continue reading

SC awards take industry trials and award tokenless inventor 5* and Best Buy

SecurEnvoy’s SecurAccess is a product for authentication using multifactor and/or biometrics. This class of products provide enhanced security for users providing credentials for access to an authenticator or authentication server. Supplicants may be users or devices. SecurEnvoy uses a unique … Continue reading

SecurEnvoy maintains its position as a Visionary in the Gartner Magic Quadrant for user authentication solutions

Recently, Gartner Inc., a leading research and consulting company in the field of information technology, published its Magic Quadrant for User Authentication (Ant Allen, December 9, 2013). SecurEnvoy, an expert in tokenless two-factor authentication, was among 20 vendors included in the … Continue reading

Managing your online identity

Businesses are becoming increasingly concerned with the amount of personal and company data that is available to government authorities. And with good cause; unbeknown to many business leaders and employees, it is possible for government organisations to access business data … Continue reading

Demand for the cloud keeps increasing

Infosec Cloud, a cloud-based security services reseller, has today announced the launch of a fully managed tokenless two factor authentication service. This new service is delivered using SecurEnvoy Tokenless Two Factor authentication, which enables users to authenticate using the devices they use in … Continue reading

A world without tokens

Authentication Live Demo

application-demo Try a 2FA Log-In

Free 30 Day Trial

application-demo Get Your Trial

Request a Call Back

Request a Call Back Request a Call Back


Upcoming Events

To view more details on our events, Click Here

Contact Us | +44 (0) 845 2600010