mobile authentication

mobile authentication news search results

Developer news items we found relating to mobile authentication

14 results
IDVoice-biometric-security-update-has-been-released

IDVoice biometric security update has been released


Friday, June 22, 2018 by

ID R&D released the newest version of its most advanced voice biometric security solution, IDVoice. Additionally, ID R&D is announcing that both IDVoice and its behavioral biometric security solution, IDBehave, are now available on the Samsung SDS Digital Identify Platform. IDVoice is a mobile-optimized voice biometric solution that authenticates users by eva...


Shared-data-machine-learning-PaaS-kicks-off-from-Cloudera

Shared data machine learning PaaS kicks off from Cloudera


Tuesday, March 13, 2018 by

Cloudera, Inc. announced Cloudera Altus with SDX, a machine learning and analytics Platform-as-a-Service (PaaS), built with a shared data catalog providing the business context of that data. Altus supports a variety of high-value business use cases that require applying multiple data analysis capabilities and approaches together. SDX makes it possible for those analytic...


Headway-joins-elite-mobile-ad-fraud-coalition-CAAF

Headway joins elite mobile ad fraud coalition CAAF


Thursday, February 15, 2018 by

Headway has announced its acceptance as a member of the Adjust Coalition Against Ad Fraud (CAAF). Headway’s dedication to stemming the tide of mobile ad fraud has earned them this position within the orginization.Coalition membership is exclusive to companies who have passed a rigorous vetting process and agree to follow a set of guidelines, including performance and la...


Exostar-launches-mobile-multifactor-authentication-solution

Exostar launches mobile multifactor authentication solution


Friday, December 15, 2017 by

Exostar has announced the general availability of a new option for multifactor authentication. Exostar Mobile ID is a smartphone or tablet app-based authenticator for which it has achieved Level 3 SAFE-BioPharma certification under the FICAM trust framework. The solution turns an individual’s mobile device into a secure hardware-based second factor for access control to...


The-battle-of-biometric-security-coming-in-2018

The battle of biometric security coming in 2018


Friday, November 3, 2017 by

Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...


Creating-apps-for-iPhone-X-with-newly-opened-doors

Creating apps for iPhone X with newly opened doors


Tuesday, October 17, 2017 by

Over the past ten years of new iPhones, Apple has introduced features - some with little fanfare and others as marquee parts of the new phones - which cause a seismic shift in user behavior. Shifts in user behavior create opportunities for app developers to create enduring brands and experiences.The Apps of TomorrowAn analysis of some of these features and the enduring ...


Dashlane-enterprise-password-manage-platform-launches

Dashlane enterprise password manage platform launches


Wednesday, September 20, 2017 by

Dashlane announces Dashlane Business 2.0, an enterprise password solution backed by a U.S. patented security architecture. Business 2.0 is a password management solution that strengthens organizational password security and reduces unsecure password sharing. The platform provides visibility into whether employees are reusing passwords across personal and work accounts. ...


Behavioral-and-biometric-mobile-authentication-will-end-passwords

Behavioral and biometric mobile authentication will end passwords


Friday, September 15, 2017 by

You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...


Carriers-team-up-to-provide-better-mobile-authentication

Carriers team up to provide better mobile authentication


Thursday, September 14, 2017 by

Mobile users are faced with the challenge of managing dozens of difficult-to-remember passwords for many applications. Even with the best user practices, hackers can social engineer passwords from users, leaving consumers and enterprises vulnerable to identity theft, bank fraud, fraudulent purchases and data theft.To help tackle this issue, AT&T, Sprint, T-Mobile an...


HUMANOBOT-can-discover-non-human-activities-trying-to-commit-fraud

HUMANOBOT can discover non-human activities trying to commit fraud


Tuesday, July 25, 2017 by

SecuredTouch's HUMANOBOT behavioral biometrics tech has recently fine-tuned its platform to better detect non-human activities like bots and emulators trying to commit fraud. HUMANOBOT detects non-human behavior generated by bots, malware, and automated scripts and stops fraud-focused emulators within mobile applications.The system recognizes these behaviors using advan...


InnoVault-lets-you-embed-end-to-end-data-security-encryption-to-apps

InnoVault lets you embed end-to-end data security encryption to apps


Friday, July 21, 2017 by

Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...


Iris-Scanning-and-the-Future-of-Mobile-Security

Iris Scanning and the Future of Mobile Security


Wednesday, September 14, 2016 by

The promise of iris scan technology has been shown in sci-fi movies for decades. Various governments use it to secure borders, defense facilities, banks use it to authenticate high value transactions, secure access to safes and vaults. Recent advancements in the evolving mobile biometrics field has brought iris recognition technology to our hands – to our mobi...


Adobe-Releases-New-EchoSign-Electronic-Signature-Capabilities-For-Salesforce-Customers

Adobe Releases New EchoSign Electronic Signature Capabilities For Salesforce Customers


Thursday, October 9, 2014 by

Adobe has announced the latest version of EchoSign for Salesforce, bringing e-signature and document workflow automation capabilities to Salesforce customers and Salesforce1 mobile app users.  With the new release, EchoSign customers who use the new Adobe EchoSign for Salesforce app will benefit from a tighter integration with Salesforce1 for mobile e-signing,...


New-Centrify-MAS-SDK-Lets-Enterprise-Mobile-Apps-Play-With-Active-Directory

New Centrify MAS SDK Lets Enterprise Mobile Apps Play With Active Directory


Wednesday, January 15, 2014 by

Centrify Corporation has launched a new developer site to provide direct access to Centrify’s SDKs which provide identity management services through cloud, mobile and datacenter applications and systems. The site also serves as a hub for newly introduced and updated SDKs, technical resources on integration, code samples, interaction with the developer community, a...