Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

RSA Turns Android Devices Into SecurID Tokens

RSA announced today that its SecurID Software Token will be available for Android smartphones, enabling users of the popular mobile operating system with secure, two-factor authentication to enterprise applications and resources using their Android powered device as an RSA SecurID authenticator.

RSA announced today that its SecurID Software Token will be available for Android smartphones, enabling users of the popular mobile operating system with secure, two-factor authentication to enterprise applications and resources using their Android powered device as an RSA SecurID authenticator.

RSA is also releasing a new Software Development Kit (SDK) for the Android platform, designed to allow developers to embed RSA SecurID two-factor authentication directly into Android applications. The SDK is available free of charge for all RSA Secured partners.

RSA SecurID for Android

Two-factor authentication is based on something a user knows (a password or PIN) and something they have (an authenticator such as a hardware toek or mobile device)—providing a more reliable level of user authentication than passwords alone. The RSA SecurID Software Token for Android generates a one-time password that changes every 60 seconds. Using this one time password along with a users “regular” password or PIN, organizations can enable secure access to corporate resources.

The token is free and can be installed directly onto Android enabled devices via a simple download from Android Market. It does require an existing installation of the RSA SecurID system, however. RSA’s SecurID technology is used by over 25,000 customers worldwide. “The smart phone is revolutionizing the way consumers and commercial organizations are doing business,” noted Mark Diodati, Research Director at Gartner.

“The smart phone will become the default strong authenticator for users in the near-term; it means one less device that the user must carry. It’s important that strong authentication methods like one-time password devices are supported on smart phones, and that developers have an easy way to embed this high-quality authentication method into mobile applications.”

Software tokens helps decrease total cost of ownership for organizations as they don’t require any physical shipping, can be revoked and automatically redeployed if an employee leaves the company, eliminating the need for replacement tokens. Additionally, having the software authenticator on business-critical smart phones reduces the number of costly technical support calls for misplaced tokens.

The RSA SecurID software token for the Android will be available for free download December 22, 2010 from Android Market.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...