Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Enterprise SMS Authentication Set to Challenge Tokens

CoreSight and 2nd Phase Introduce SecurEnvoy to Australia; Simplify Two-Factor Authentication
  • 19 November, 2009 08:15

<p><b>MELBOURNE, VIC: November 19, 2009</b> - It’s not news that organisations are constantly driving their people to achieve more for less. And traditionally, the cost of deploying and managing token-based authentication systems is a significant expense for many businesses.</p>
<p>With this in mind local security VAR CoreSight and distributor 2nd Phase formed an alliance to explore the market and see where improvements – and savings – could be made. This search led to a partnership arrangement with <a href="" target="_blank">SMS authentication specialists</a>, SecurEnvoy.</p>
<p>The vendor’s flagship offering, SecurAccess, provides a strong ROI compared with legacy hardware token solutions. Clients are making savings of up to 70% compared to their previous token-based systems, and this before management savings are considered. With a more convenient end user experience and superior administration setup, SecurAccess delivers a ‘quick win’ for many customers. And problems like shipping, distributing and replacing tokens disappear, along with their cost.</p>
<p>There are some real advantages in using the (almost) ubiquitous mobile phone as a method for delivering authentication. Campbell Bradford, founder at 2nd Phase, emphasised this, saying, "Because software isn’t required on the phone, costly testing, support and training issues are largely eliminated. This becomes even more important as phone interfaces are constantly changing with each new model."</p>
<p>Steve Watts, co-founder at SecurEnvoy, is quick to explain why SecurAccess has been so popular. "With worker mobility continuing to increase, we’ve developed a system that delivers workers the flexibility they crave but without compromising security. Tokens can be lost, damaged – and they need to be managed by IT. Everyone carries a mobile with them all of the time, so it’s a much easier and safer option."</p>
<p>Examples of organisations that are using SecurAccess across the world include ING, Caterpillar, Logica, Scania, T-Mobile, AXA and PWC.</p>
<p>Watts also highlighted a different aspect of the push towards tokenless authentication. He said: "IT departments need to be aware that authentication tokens are far from green. We believe that it’s important that organisations evaluate the security options carefully, so as not to waste time and money on technology that will increase their carbon footprint."</p>
<p>For Scott Jackson, speaking on behalf of CoreSight, SMS deliverability is a key area. Jackson said, "A key requirement we needed to see is the capability to address potential issues around network coverage and delivery delays. We’re impressed that the SecurAccess product has been specifically built to prevent these potential drawbacks."</p>
<p>SecurAccess is available to try or buy today. Onsite and web demonstrations are also available now through local partners <a href="" target="_blank">CoreSight</a>. To arrange an evaluation or discover a little more, contact CoreSight using the details below.</p>
<p><b>About SecurEnvoy:</b><br/>
SecurEnvoy is the trusted global leader of tokenless two-factor authentication. As the pioneers of mobile phone based tokenless authentication; SecurEnvoy lead the way with ground breaking solutions that others aspire too.</p>
<p>Our innovative approach to the tokenless market now sees thousands of users benefitting from our solutions all over the world. With users deployed across five continents, our customers benefit from significant reduced time to deploy and a zero footprint approach means there is no remote software deployment and administrators enjoy the management tools allowing them to rapidly deploy up to 15000 users per hour. Visit the website at <a href="" target="_blank"></a></p>
<p><b>About 2nd Phase:</b><br/>
2nd Phase brings affordable security products to Australian and New Zealand. Products that are proactive so you can secure your systems for tomorrow - not just for today. For more information visit <a href="" target="_blank"></a>.</p>
<p><b>About CoreSight:</b><br/>
CoreSight are a specialist Australian security VAR that choose innovative, best-of-breed products for our clients. Our partners' products include those from Imprivata, VASCO, Attachmate, SecurEnvoy, SanDisk and PGP. From headquarters in Melbourne, CoreSight delivers security products and support services to clients primarily in the finance, healthcare, manufacturing and government sectors. The CoreSight philosophy is to continually seek innovation in the security market, and to be the first to share these new ideas, products and services with our clients.</p>
<p>For more information please visit <a href="" target="_blank"></a> or call +613 9878 2726</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place