Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

VASCO’s DIGIPASS Technology to be Embedded Into Intel Identity Protection Technology

VASCO Data Security, a provider of software security authentication solutions, today announced that VASCO’s DIGIPASS authentication technology can now utilize the embedded token of Intel® Identity Protection Technology (Intel® IPT), allowing customers to deploy two-factor authentication without the need to roll-out software or hardware devices to end-users.

VASCO Data Security, a provider of software security authentication solutions, today announced that VASCO’s DIGIPASS authentication technology can now utilize the embedded token of Intel® Identity Protection Technology (Intel® IPT), allowing customers to deploy two-factor authentication without the need to roll-out software or hardware devices to end-users.

VASCO’s DIGIPASS offering for Intel IPT replaces the use of static passwords by dynamic one-time passwords (OTP). The dynamic password is user specific and only valid for a limited period of time. Authentication technology protects against online transaction fraud, data and identity theft.

The 2nd Generation Intel Core processor platforms will support a VASCO applet. When an end-user wants to log-on securely to a website using DIGIPASS, the applet on the chip will send the OTP for validation. The server will request validation from VASCO’s back-end authentication software, which will send the response to the server of the application service provider, who will grant access to the end-user. The Intel IPT technology works seamlessly with VASCO’s range of authentication server software, VACMAN and IDENTIKEY, as well as with DIGIPASS as a Service, VASCO’s cloud-based authentication platform.

DIGIPASS for Intel® IPT allows customers to deploy two-factor (OTP) authentication without the need to roll-out authentication hardware or software to the end-user. Two-factor authentication is present on laptops or PCs based on the 2nd Generation Intel Core processor platforms. End-users only need to activate the authentication capability online.

DIGIPASS® for Intel IPT is suited for use by online application providers wanting to add a second authentication layer to the DIGIPASS hardware based authentication they already use by binding a specific user to a specific PC. Ideal customer uses include insurance and healthcare agencies to protect client or patient confidentiality, by corporations to protect e-mail and network traffic, or help providers of online subscription-based service to preserve their revenue stream.

Related Reading: Best Practices for Testing Secure Applications for Embedded Devices

“We are convinced that the option of embedding authentication technology on the majority of the world’s desktop and laptop computers will open new market opportunities for authentication. The authentication technology on Intel IPT is the enabler for multi-application authentication,” says Jan Valcke, President and COO at VASCO Data Security.

Advertisement. Scroll to continue reading.

“The integration of DIGIPASS authentication capability with Intel IPT is the result of intensive teamwork between both our engineering departments,” said George Thangadurai, general manager of PC client services at Intel. “With online fraud, credential and data theft continuously on the rise, the need for more secure log-on procedures and e-signatures is only growing, especially in the online consumer sector. We are convinced this approach makes authentication easier and more straightforward for end users.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.