Story image

ESET: Two-factor authentication crucial in today's world

16 Mar 2016

ESET has officially announced a new version of its secure, mobile-based two-factor authentication system which provides additional security for accessing company networks and sensitive data.

Two-factor authentication (2FA) safeguards a company against data breaches and supports privacy compliance by adding an extra layer of security to verification processes, ESET says.

Unlike standard password authentication, ESET Secure Authentication (ESA) 2.4 requires two elements: a user’s password, plus a one-time password (OTP) generated on the user’s smartphone. It’s a simple way for businesses to reduce the risk of stolen, weak or cracked passwords, according to ESET.

“In today’s security environment, two-factor authentication is extremely important given all the poor password practices,” says Jeff Chen, ESET director of solutions marketing.

“ESA 2.4 helps prevent the risk of breaches by using unique passwords for each access, and also adds two-factor authentication to a wider range of applications and data such as Office 365 or Google apps. In response to customer feedback, ESA 2.4 makes significant improvements in both user experience and support,” Chen says.

ESA 2.4 includes local login protection for Windows in a domain environment, as well custom delivery options and support for web/cloud services via Microsoft ADFS 3.0 integration. ESA 2.4 can be deployed to supplement nearly all existing VPN devices, adding authentication without any significant change to the VPN configuration, according to ESET. Any business running Active Directory can protect their data in around 10 minutes with ESA’s double-click installer.

ESET recently joined technology industry leaders to support increased cybersecurity awareness and encourage consumer use of multi-factor authentication to improve online security.

Together with Google, Apple, Facebook, Amazon and other leading technology companies, ESET signed a letter to the National Cyber Security Alliance (NCSA) supporting President Obama’s effort to increase awareness of key security steps that all Americans can take.

Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.
Informatics deepens integration with Google Cloud
The data management company has connected its solutions with Google Cloud’s big data analytics solutions.