Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Pat Romanski, William Schmarzo, Elizabeth White, Carmen Gonzalez

News Feed Item

The FIDO Alliance Focuses RSA Conference 2014 Community on Standards-Based Strong Authentication

FIDO Ready(TM) Products and Services Introduce Enterprise, Financial Services, eCommerce and Consumer Web Services to Authentication That Is More Secure, Private and Easier-To-Use Than Passwords and PINs -- February 26, Moscone North, Room 110

SAN FRANCISCO, CA and MOUNTAIN VIEW, CA -- (Marketwired) -- 02/19/14 -- RSA-- The FIDO (Fast IDentity Online) Alliance (http://www.fidoalliance.org/), an industry consortium revolutionizing online authentication with standards for strong authentication, today announced plans for the RSA Conference USA 2014, which is taking place in San Francisco, CA from February 24-28. The FIDO Alliance will pursue new members at the RSA Conference and strive to engage the Security community at large in developing universal strong authentication. FIDO authentication equips users of online, mobile, and point-of-sale applications to access sites and services and confirm transactions with better authentication that is more secure, private, and easier-to-use than passwords and PINs. At the RSA Conference, FIDO Alliance member organizations will demonstrate FIDO Ready™ products based on FIDO specifications.

"We look to the RSA Conference 2014, in San Francisco, to engage new members from the Enterprise, Financial Services, and E-Commerce sectors. Along with many others, these groups are critically challenged to replace password and PIN dependencies with strong authentication," said FIDO Alliance president Michael Barrett. "The FIDO Alliance is active and available at this year's RSA Conference to brief organizations on the emerging authentication capability that offers Relying Parties and their users authentication that is simultaneously more secure, private, and easier to use."

The FIDO Ready Showcase on Wednesday afternoon, 1-5 pm, February 26, Moscone North, Room 110 will feature two FIDO Alliance member panels, FIDO Ready product demonstrations, and a chance to meet and interact in one-to-one meetings with many FIDO Alliance members. All RSA attendees are welcome to come and learn more about FIDO specifications, FIDO Ready products, and how to engage with the FIDO Alliance to start using FIDO specifications for universal strong authentication.

Meet the FIDO Alliance at RSA Conference 2014

Speaking Events:

  • Monday, February 24, 9:15 am at the Westin Hotel, FIDO Alliance founding board member Nok Nok Labs' CEO Phillip Dunkelberger will be presenting at AGC's Security Conference.

  • Tuesday, February 25, 2:40 pm - RSA panel "Are Mobile Devices the Answer to the Strong Authentication Problem?" features FIDO Alliance Board members: Michael Barrett, president, the FIDO Alliance; Phillip Dunkelberger, CEO, Nok Nok Labs, Inc.; Brett McDowell, Head of Ecosystem Security, PayPal; and Nils Puhlmann, Founder, Cloud Security Alliance with moderator Al Pascual, Senior Analyst, Javelin Strategy & Research.

  • Wednesday, February 26, 8:00 a.m. - RSA panel "The Future of Authentication: Different Approaches to the Same Goal." Distinguished Forrester analyst Eve Maler will moderate the panel with FIDO Alliance members: president Michael Barrett, VP Brett McDowell, and Mayank Upadhyay of Google, who will be joined by Bob Blakely of Citigroup.

  • Wednesday, February 26 at 1:00 and 3:00 p.m. Moscone North, Room 110, the FIDO Alliance FIDO Ready Showcase will feature two member panels discussing the importance of the FIDO Alliance and how organizations can start using FIDO specifications now.

Sponsored Events:

  • FIDO Alliance founding board member Nok Nok Labs is hosting a networking drinks reception at Bluestem Brasserie, on Monday, February 24 5-8 pm. Registration is required; details can be found at https://noknok2014.eventbrite.com.

  • RSA attendees with badges are invited to attend the FIDO Alliance co-hosted event, Non-Profits on the Loose on Tuesday, February 25, Minna Gallery, 5-9 p.m.

  • The FIDO Ready Showcase will feature a FIDO Alliance member panel, FIDO Ready live product demonstrations, and a chance to meet and interact in one-to-one meetings. Wednesday, February 26, Moscone North, Room 110, 1-5 p.m.

Meeting Places:

FIDO Alliance Members Demonstrating FIDO Ready™ Products at RSA Conference 2014
RSA attendees can experience FIDO Ready products in action at the FIDO Ready Showcase on Wednesday, February 26, Moscone North, Room 110, 1-5 p.m., and other RSA booths and conference locations, as noted. FIDO Ready products and services from AGNITiO, GO-Trust, Infineon Technologies, Nok Nok Labs, NXP Semiconductors, and Yubico will be on display at the RSA Conference 2014.

FIDO Alliance members will demonstrate FIDO Ready products that are based on FIDO specifications. These solutions have undergone an interoperability testing process against FIDO specifications. RSA demonstrations of FIDO Ready products will illustrate the clear value interoperable, more secure, private, and easier-to-use authentication devices and solutions can deliver to organizations and their constituents.

Organizations are increasingly challenged to manage user bases of personal information and passwords. While their users are repeatedly frustrated trying to remember and manage multiple passwords to access sites and services and confirm actions they take every day. FIDO innovations address a key pain point for Enterprise, Financial Services, eCommerce, and many categories of Relying Parties, by reducing the clear risk that comes with having to manage users' passwords across the current threat landscape. FIDO authentication enables existing and new authentication products and services to deliver better authentication that overcomes the prevailing reliance on passwords and PINs.

Specifications for FIDO authentication outline a model with a core focus on privacy -- all biometric and/or personally identifiable information (PII) stays local on the user's device and is not shared to the cloud or over the network.

  • AGNITiO "Voice iD" protects a user from device to call center, by identifying their unique, natural spoken voice. AGNITiO will demonstrate Voice iD as a simple, universal way to replace passwords and PINs when authenticating smartphones, laptops and applications, and securing digital transactions. See Voice iD in multifactor demonstrations at the FIDO Ready Showcase Wednesday, February 26, Moscone North, Room 110, 1-5 p.m.

  • GO-Trust FIDO microSD supports FIDO login and includes 8GB memory capacity for user storage. FIDO microSD will work with 99 percent of existing laptops and personal computers and the one billion Android devices in the marketplace, making devices FIDO Ready. For enterprises and end users, microSD will soon be available at popular online merchants like eBay and Amazon. Demos of GO-Trust FIDO microSD can be seen at the FIDO Ready Showcase and on the RSA floor at the Infineon area of the IT Security Association Germany, "German Pavilion," TeleTrusT booth # 3421, North Exhibition Hall.

  • Nok Nok Labs will be demonstrating the NNL™ Multifactor Authentication Server (MFAS), the only server solution currently certified as FIDO Ready for both the UAF and U2F protocols. The demo will show Android and Desktop clients authenticating with a range of different biometric and non-biometric use cases. FIDO Ready Showcase Wednesday, February 26, Moscone North, Room 110, 1-5 p.m and the Nok Nok Labs meeting suite.

  • Yubico will demonstrate the FIDO U2F protocol in YubiKey NEO. YubiKey NEO enables secure single key log in from a mobile device or computer, to any number of online services, with a simple touch and with no client software needed. The product is an extension of the YubiKey invention, used by millions of users in 120 countries. FIDO Ready Showcase Wednesday, February 26, Moscone North, Room 110, 1-5 p.m., and NXP booth# 1341.

Industry-driven FIDO specifications will support a full range of authentication technologies, including biometrics such as fingerprint and iris scanners, voice and facial recognition. FIDO specifications will enable existing solutions and communications standards, such as Trusted Platform Modules (TPM), USB Security Tokens, embedded Secure Elements (eSE), Smart Cards, Bluetooth Low Energy (BLE), and Near Field Communication (NFC). FIDO specifications are being designed to be extensible and to accommodate future innovation, as well as protect existing investments. FIDO specifications allow the interaction of technologies within an interoperable infrastructure, enabling authentication choice to meet the distinct needs of users and organizations.

About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.

The FIDO Alliance Board of Directors includes leading global organizations: Blackberry®; CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); Google; Lenovo; MasterCard (NYSE: MA); Microsoft (NASDAQ: MSFT); Nok Nok Labs, Inc.; NXP Semiconductors N.V. (NASDAQ: NXPI); Oberthur Technologies OT; PayPal (NASDAQ: EBAY); RSA®; Synaptics (NASDAQ: SYNA); Yubico.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:

Suzanne Matick
for FIDO Alliance
831-479-1888
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, discussed how a user-centric Application Performance Management solution can help inspire your users with every applicati...
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
The consumption economy is here and so are cloud applications and solutions that offer more than subscription and flat fee models and at the same time are available on a pure consumption model, which not only reduces IT spend but also lowers infrastructure costs, and offers ease of use and availability. In their session at 15th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed this shifting dynamic with an ...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackI...
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT transformation?
You use an agile process; your goal is to make your organization more agile. But what about your data infrastructure? The truth is, today's databases are anything but agile - they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application an...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
SYS-CON Events announced today that SUSE, a pioneer in open source software, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SUSE provides reliable, interoperable Linux, cloud infrastructure and storage solutions that give enterprises greater control and flexibility. More than 20 years of engineering excellence, exceptional service and an unrivaled partner ecosystem power the products and support that help ...
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises ...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...