Enterprise Grade Security Launched by SecureAuth
October 11, 2012
By Tabitha Naylor
, Contributing Writer
To develop and publish one-touch mobile applications, enterprises are being driven by their employees, partners and customers to offer convenience, ease of use and maximum mobility. To centrally manage and secure access to corporate mobile applications, “Lacking for IT” is a method that provides single-sign-on (SSO) between these applications.
Launched today by the leading provider of identity enforcement technology for the enterprise, SecureAuth, IT managers and corporate mobile device users now have secure access to and management of their enterprise-grade mobile applications with SecureAuth IdP for Mobile.
Securing enterprise-grade mobile applications by abstracting the authentication from one application, SecureAuth IdP for Mobile then passes the identity to other applications. To native mobile, Web and Software-as-a-Service (SaaS (News - Alert)) applications, it also provides two-factor authentication and SSO in order to make logging onto mobile apps fast but secure across all applications.
"While there's been fierce discussions on how to secure, manage and enforce security policies with bring your own devices, we've gone a step further and developed a patented method to secure mobile applications with SecureAuth IdP for Mobile," commented Craig Lund, chief executive officer at SecureAuth.
He added that SecureAuth IdP for Mobile easily integrates to any mobile application to manage identities and provide SSO, so CIOs no longer have to worry about potential intrusions or user and data hacks via unsecured, unmanaged mobile apps.
Sally Hudson, research director, Security Products and Services at IDC (News - Alert), mentioned that having security for mobile applications is part of protecting the network mainly because security is needed across all fronts of the enterprise.
For securing access to applications from mobile devices, IT managers need an effective yet easily deployable method that won't divert resources from their core responsibilities of keeping their systems running for revenue-generating processes.
Garret Grajek, chief technology officer at SecureAuth, said what’s revolutionary is that based on policies that the enterprise dictates for any user granted access, SecureAuth IdP verifies two-factor authentication.
Edited by Braden Becker