Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Pat Romanski, William Schmarzo, Elizabeth White, tru welu

News Feed Item

Milton Security Integrates Two Factor Authentication With Their Cloud Authentication Security Appliance, Further Helping Education and Organizations to Secure Their Networks

FULLERTON, Calif., March 17, 2014 /PRNewswire/ -- Milton Security Group, Inc, the manufacturer of adaptive network security appliances and network management solutions, announced today that they have added an exciting new feature to their Cloud Authentication Security (CAS) solution.

(Photo:  http://photos.prnewswire.com/prnh/20140317/PH84895-a)

(Logo:  http://photos.prnewswire.com/prnh/20140317/PH84895LOGO-b)

Many organizations are looking for different ways to authenticate and track users on their network. Milton introduces two new features options with the addition of both a cloud-based two-factor authentication system, and a locally hosted two-factor authentication.

Any passwords or username, no matter how complex, can be cracked.  The benefit of a two-factor authentication is that even if someone has your login information, they still need that second piece of the puzzle.  This second piece is either something you have, like your mobile phone. DUO Security and WiKID Systems both offer two-factor authentication services, with individual twists.  DUO Security is a cloud-based service, which requires very little set up.  The ease of setup and configuration is painless.  DUO is free for less than 10 users.

WiKID Systems is locally hosted at your premises, keeping your data and control local.  The highly scalable, multi-tenant server is available as a software appliance or as Linux packages. It includes scripts to allow user-self registration in a secure manner, group functionality, RADIUS return attribute support, detailed logging and reporting.  It also allows greater functionality, such as mutual SSL authentication and multiple tokens per user.

"Data breaches are rising at a startling rate and two-factor authentication has become an absolute must if you're serious about information security," states Milton CEO, James McMurry, "and Milton Security Group is striving to give customers as much control as possible."

Since the CAS solution now integrates with both DUO Security, and WiKID Systems, organizations can choose to further lock down their cloud authenticated networks using either cloud based or locally hosted two-factor systems.

Cloud Authentication Security (CAS) was introduced last week, along with its first integration: Google Apps for Education (GAFE).  By using CAS, educational institutions can provide a single sign-on environment by integrating Google Apps For Education Authentication with either of the Adaptive Network Access Control appliances Milton Security manufactures (Edge7200 and ICEGuard).  Now with the integration of Two Factor Authentication into CAS, all organizations, including Education, can fully secure their network, by ensuring credentials and endpoints  are secure.

About Milton Security Group, Inc:

Milton Security Group Inc is the leader in providing adaptive granular endpoint security for all organizations.  Unlike legacy platforms, Milton Security focuses on enabling and securing your systems, while dynamically enabling new technology requirements like BYOD and Cloud Security securely and efficiently. Milton Security Group is based in Fullerton, California, and is a privately held company.  For more information, visit miltonsecurity.com

About WiKID Systems 

WiKID Systems, Inc., founded in 2001,  is an Atlanta-based, self-funded and profitable  technology company focused on helping companies and organizations reduce their dependence on passwords by making two-factor authentication simple and accessible, while allowing organizations to maintain control.    For more information including pricing and documentation, please visit  www.wikidsystems.com.

About DUO Security

Duo Security's hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo's unique, high-availability architecture provides centralized management, self-service enrollment, and interactive secondary login through an intuitive web interface, eliminating the high costs, complexity, and confusion associated with traditional two-factor systems. Duo Security is based in Ann Arbor, Michigan, and is a privately held company whose investors include Google Ventures, True Ventures, Resonant Venture Partners, and Radar Partners.

Contact :   

Gosia Pasternak
(714) 515 4011

Read more news from Milton Security Group, Inc.

SOURCE Milton Security Group, Inc

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The multi-trillion economic opportunity around the "Internet of Things" (IoT) is emerging as the hottest topic for investors in 2015. As we connect the physical world with information technology, data from actions, processes and the environment can increase sales, improve efficiencies, automate daily activities and minimize risk. In his session at @ThingsExpo, Ed Maguire, Senior Analyst at CLSA Americas, will describe what is new and different about IoT, explore financial, technological and re...
Andi Mann has been serving as Conference Chair of the DevOps Summit since its inception. He is one of the world's recognized leaders in DevOps, and continues to be one of its most articulate advocates. Here are some recent thoughts of his in an interview we conducted in the run-up to the DevOps Summit to be held June 9-11 at the Javits Center in New York City. When did you first start thinking about DevOps and its potential impact on enterprise IT? Andi: I first started thinking about DevOps b...
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
The web app is Agile. The REST API is Agile. The testing and planning are Agile. But alas, Data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes which force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software orga...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile ...
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between confe...
There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industry. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not ...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager – Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, will review next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discuss how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Speaker Bios Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has b...
The enterprise market will drive IoT device adoption over the next five years. In his session at @ThingsExpo, John Greenough, an analyst at BI Intelligence, division of Business Insider, will analyze how companies will adopt IoT products and the associated cost of adopting those products. John Greenough is the lead analyst covering the Internet of Things for BI Intelligence- Business Insider’s paid research service. Numerous IoT companies have cited his analysis of the IoT. Prior to joining B...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...