Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Signify moves 2FA onto Android smartphones and tablets

According to Dave Abraham, the Cambridge, UK-based security firm's CEO, with the flexibility of Signify's token and tokenless options, companies can combine different 2FA services to meet the needs and working patterns of all their users.

"And because it is a hosted service, there is no need to install and manage a range of complex 2FA in-house systems", he said, adding that, new users can also quickly and easily select their authentication options for secure remote access.

Signify claims its software tokens operate just like hardware keyfob tokens, but with the convenience of using a smartphone.

The firm says that, when a user wishes to access their corporate data remotely from a PC or laptop, they simply enter their secret PIN into the token application running on the smartphone, which then generates a one-time passcode that the user enters into the password field on the computer.

By demonstrating that they have these two 'factors' - a secret PIN and their smartphone - the user is securely identified.

Infosecurity notes that Signify's solutions have a good client base in the financial services industry, suggesting that retail banking customers may eventually be able to move to a smartphone based 2FA platform.

In addition, after 10 years in the IT security business, Signify has more than 60,000 users of its technology.

The firm also reports that its software token approach can help to decrease the total cost of ownership as the technology does not require any physical shipping and can be easily deployed - and revoked - when a member of staff joins or leaves an organisation.

Abraham says that, with more and more people working remotely and logging on to company networks, it is vital that employers have a secure alternative to simple passwords in place to ensure that users have authorisation to access sensitive information and resources.



What’s Hot on Infosecurity Magazine?