YOU ARE AT:TagsAuthentication

BROWSING: authentication

NXP intros new authenticator tool to raise security across IoT lifecycle

Dutch chip manufacturer NXP Semiconductors has introduced a new IoT authentication device, part of its EdgeLock authenticator family, to raise security across multiple standards in various IoT ecosystems. The new NXP EdgeLock A5000 authenticator is described as a “scalable solution” for authentication applications in...

ZenKey provides easy, secure mobile authentication

The Mobile Authentication Taskforce, comprised of AT&T, Sprint, T-Mobile and Verizon, unveiled ZenKey at MWC LA Heading into this year’s Mobile World Congress (MWC) Los Angeles, GSMA prioritized demonstrating its work with ZenKey, the Mobile Authentication Taskforce’s — comprised of AT&T, Sprint, T-Mobile and Verizon...

Making smart buildings safer with trusted ID solutions (Reader Forum)

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure. Two of the most significant challenges in accomplishing this are guard tour management and ensuring that all fire and safety equipment complies with...

The pain of 802.1X authentication (Reader Forum)

The 802.1X standard for authenticating access to wired and wireless networks has met with a good deal of scrutiny in recent years. While 802.1X was considered a success when initially implemented on wired networks, with the shift to wireless networks, the growth of the...

Iris identity authentication is coming to the internet of things

Earlier this month, EyeLock, a company focused on iris-based identity authentication solutions, announced the introduction of three reference designs architected for high volume OEM integration. EyeLock's new product was designed to fill the rapidly increasing demand for iris authentication solutions for "internet of things" devices and applications...

Reality Check: In search of better authentication in an IoT world

In 2013, according to IDC, the digital universe contained 4.4 zettabytes of data. By 2020, that figure will surge to 44 zettabytes. This 10x jump in data is the result of the explosion of mobile devices, cloud services and the millions of sensors and...

Zero-touch authentication gives security with no hassle

We're all familiar with the one- or two-step verification processes associated with online or mobile transactions; it slows down a user but provides security for potentially sensitive information. But now, zero-touch authentication could remove the hassle while maintaining security. Ram Varadarajan, SVP and GM of...