Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 3000 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Intel core processors to get strong authentication security

February 09 2011

Looking to help customers strengthen data security, Intel said it will include stronger one-time password authentication in its upcoming 2nd Generation Intel Core Processor platforms.

The system, known as Intel Identity Protection Technology (IPT) features built in two-factor authentication to stop unauthorized access to the system. Mike Reed, general manager of identity protection in the PC Client group at Intel, says IPT "is brand-new technology running in the firmware embedded with the chipset." He says Intel expects the Intel 2nd Generation Core Processors, including Intel Core vPro processors, that support Intel IPT, to be available in the March timeframe.

Security vendors Symantec VeriSign and Vasco Data Security also announced their own specific one-time password authentication technologies would be able to use the Intel IPT embedded token-security method. One-time passwords — viewed as stronger security than re-usable passwords — need to have a way, such as an algorithm, to generate a unique password each time a user wants to authenticate online. The Intel IPT technology allows for third-party vendor software to be embedded in the Intel chipset's firmware, so that the Intel-based computer itself instead of a separate hardware token, can generate the one-time password for the user.

"One-time password credentials are often found on discrete devices," such as handheld token hardware or even cell phones, notes Atri Chatterjee, vice president of user authentication at Symantec. The Intel IPT technology, which Symantec supports with the Symantec VeriSign VIP software and cloud-based service, means that the stronger one-time password authentication "comes in your PC" rather than a separate handheld token.

The Symantec VeriSign approach is the back-end authentication processing the user one-time password submission online is done through the Symantec VeriSign cloud service. "You can use the VIP service to authenticate into your organization, or to PayPal or your bank," Chatterjee says. Paypal, for example, already accepts strong authentication using VIP, he adds.

In general, end users obtain the embedded credentials for free while organizations, such as e-commerce sites or enterprises, buy the VeriSign VIP authentication service, which typically runs $3 or $4 per year per year based on volume. Chatterjee said about 1,000 organizations use the VIP service today.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html