Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Fraud data provider chooses mutual authentication product from Comodo

Comodo Group : 23 May, 2007  (Application Story)
Database protection and authentication solution provided by Comodo for sensitive financial information relating to fraud detection.
Comodo has announced that LETIX has selected Comodo to protect, secure and authenticate access to its database that houses sensitive financial information. LETIX, a not-for-profit organization supporting law enforcement's need for real time fraud data, will benefit from advanced authentication technologies that will ensure only authorized access to this sensitive information.

Comodo's Mutual Authentication Solution is based on strong Public Key Infrastructure (PKI) and includes Two Factor (TF) client certificates for LETIX authentication of the User and Content Verification Certificates (CVCs) to enable the User to verify the authenticity of the LETIX login box. Together, this provides the only PKI based solution that is both secure and user-friendly.

'The continued advances in authentication technologies allow us to offer this new level of access for LETIX subscribers so they can access the data securely even though they are using diverse technical platforms.' said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. 'By working with leading law enforcement companies like LETIX, we are able to deliver an integrated, best of breed solution without risking the security or safety of their subscribers.'

Comodo Mutual Authentication Solution Summary:.

1) Two Factor (TF) Client Certificates for a High-Performance, Low Cost Solution with Easy Integration.

The Comodo Two Factor solution provides the ability for LETIX to authenticate the identity of a user trying to log in. Comodo TF installs a digital certificate onto a subscriber's PC, converting the PC into a 'smart token'. Comodo TF offers significant advantages over other two-factor options:.

* Comodo is one of the only PKI based two factor solutions offered by a Certification Authority. PKI is considered one of the strongest forms of authentication available for online security.
* One of the lowest costing two factor solutions due to an established PKI infrastructure and digital certificate lifecycle management processes.
* High level of flexibility and configurability.
* Solutions can be deployed in days.

2) Content Verification Certificates (CVC) ensure subscribers can be protected from phishing, pharming, and man-in-the- middle attacks

The second part of the mutual authentication model includes Comodo's unique Content Verification Certificates that authenticates web content (such as a log-in box or graphics) to authenticate site identity. This is the only digital certificate on the market today that protects against man-in-the middle attacks as this solution alone delivers green 'good to go' indicator confirming site identity. LETIX subscribers will be able to verify LETIX's site identity using a reader called VerificationEngine which can be used to authenticate the identity of over 200,000 home page logos.

'LETIX is designed as a collaborative community of law enforcement, credit card companies and financial institutions, so maintaining intuitive yet highly-secured access was a key requirement. We are committed to the PCI security standards, and our partnership with Comodo helps us meet and exceed the high standards we set for ourselves alongside the industry standards,' said Mr. Dean Heistad, CTO of LETIX. 'It is paramount, therefore, that we offer a best practices authentication process that provides full authentication but does not impede a user's ability to get into the system. We are excited to work with Comodo to provide this level of authentication that reflects a best practice approach advocated by government guidelines, yet within a process that our stakeholders will be able to use easily.'
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo