Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Mobile telecom group uses phones for 2FA

SecurEnvoy : 11 February, 2013  (Application Story)
Tokenless two factor authentication in place at T-Mobile with the telecom company providing its employees with secure data access with 2FA using phones
Mobile telecom group uses phones for 2FA

T-Mobile is the first mobile telecommunications provider to have implemented a new remote authentication solution that utilises mobile telephones. For this, the world-renowned company has put its faith in the expertise of security experts from SecurEnvoy. The company’s SecurAccess and SecurICE solutions are based on the principle of tokenless two-factor authentication. T-Mobile staff will be able to identify themselves from anywhere when logging in using their mobile phone they will use a password and a dynamically generated passcode on the phone. This will ensure highly secure remote access to the corporate network.

T-Mobile is one of Europe’s leading mobile operators. The company wanted to enable members of staff working remotely to securely access corporate resources using a simple method involving their mobile phones. During the assessment phase, SecurEnvoy was quickly identified as the prime candidate, not least because the company became, many years ago, the first provider of solutions based on tokenless two-factor authentication. The use of the SecurEnvoy technology means that users at T-Mobile do not have to carry additional devices with them for identification purposes if they wish to access the corporate network. The only requirement is a mobile phone, which every member of staff generally has with them anyway.

The SecurAccess solution is now being used by 15,000 staff. The users have the choice for either receiving an SMS to the phone or an app for smart devices; this.t transforms mobile telephones into virtual tokens. In addition, 2,000 T-Mobile employees have become the first users of the SecurICE (In Case of Emergency) solution. This is an emergency situation service from SecurEnvoy, via which users can immediately and securely access the company’s network if they are temporarily unable to get to the company’s premises.

Instead of using physical tokens or smart cards, T-Mobile staff can now log into the network via SecurAccess using a highly secure two-factor authentication process: the first factor is a password defined by the user and the second factor is a passcode generated dynamically by SecurAccess, which the system can send via e-mail, SMS or an app to the user’s mobile telephone. If the employee wants to log into the corporate network, he or she is prompted to enter both factors. As soon as the passcode generated by the system has been used, SecurAccess then sends a new code to the user’s mobile telephone, thereby ensuring that the T-Mobile employees always possess a currently valid access code for the corporate network. As each employee is the only person that knows their respective two factors, it is ensured that no unauthorised third parties can access the network and remove data.

Regular remote users use SecurAccess whereas office based workers have been registered for SecurICE for use in the event of emergencies or other incidents, such as bad weather or traffic problems, that prevent them reaching work as planned.

Since introducing the SecurEnvoy solutions, T-Mobile has benefited from considerable time and cost savings, as there is no need for the expensive acquisition of additional hardware tokens. And time-consuming training sessions are also no longer required.

“We are a mobile telecommunications company, and it is important that we meet people’s expectations with regard to our brand,” explains Darren Westmore, project manager at T-Mobile. “We want to make mobile and decentralised work as simple as possible, while retaining the highest levels of security. However, originally using physical tokens turned out to be an extremely complicated approach, and not very user-friendly either; SecurAccess has eliminated such issues. And the best thing is that SecurAccess and SecurICE actually help us promote the use of mobile telephones. They have added a new level of functionality to our products, thus further increasing the value of our brand.”

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo