Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Startup NetAuthority Launches With Device Authentication Focus

Startup Launches With Goal of Transforming Device Authentication

Device authentication startup NetAuthority is pulling the covers off its technology today and unveiling a beta version of its authentication technology.

Startup Launches With Goal of Transforming Device Authentication

Device authentication startup NetAuthority is pulling the covers off its technology today and unveiling a beta version of its authentication technology.

The San Francisco-based company introduced its Device Authentication Service (DAS) today, which is powered by the NetAuthority’s Device Authentication Engine. The technology is aimed at providing device-centric authentication for enterprises, consumer-based online services and software-as-a-service cloud providers.

NetAuthority Logo The Device Authentication Service is based in the cloud, and is capable of large-scale device registration and authentication with enough scalability to support millions of end-user, the company said. According to the company, the solution transforms a device’s unique attributes into a device key so that the device itself becomes an identifier. The dynamic device key generator is a client plug-in and application and that generates unique device keys for each authentication session.

The dynamic device key generator works with all major web browsers and can be easily embedded in native client and mobile applications, according to the firm. The transport of device key information is protected by encryption.

“NetAuthority is strategically positioned to solve the challenges associated with mass adoption of strong authentication solutions,” said Chris Brennan, CEO and founder of NetAuthority, in a statement. “Our offering is designed to help corporations, consumer-based online services and SaaS cloud providers with the growing challenges associated with widely deploying strong authentication security throughout their business by providing an easily-deployable, scalable, transparent and affordable solution.”

Written By

Click to comment

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...