Good Vault launches two-factor authentication for iPhones
iPhones would use sleeves to read smart cards and microSD cards
Computerworld - Good Technology announced Good Vault, a system for adding two-factor authentication to the iPhone 4 and 4S for access to Good for Enterprise email.
The system will be especially valuable for government agencies and companies in highly regulated industries, such as healthcare and financial services, where it's critical to ensure that data is protected from unauthorized users if an employee's smartphone is lost or stolen, said Good Technology CTO Nicko van Someren.
With the Vault system, one of two sleeves is attached to the iPhone: One that can read a smart card or one that can read a microSD card, he said. Once either of the sleeves is in place, inserting the microSD or smart card becomes one component of the two-factor identification process, while typing in a PIN is the second. Once authenticated, users would have access to Good for Enterprise email.
If a phone is lost or stolen while the microSD or smart card is inserted in the sleeve, the PIN would still be needed for access to Good for Enterprise email. Good's management software supports remote wipes of data from smartphones.
The Good Vault iPhone application will be available for download in Apple's App Store (pricing has not been announced), but end users cannot use it unless they are licensed for Good for Enterprise and Good Vault.
Precise Biometrics developed Vault's smart-card reader, a sleeve for the iPhone that weighs just 1.5 oz. The microSD reader was developed by HID Identity Assurance. A user's identity credentials and encryption keys would be embedded in the Secure Element chip in the smart card or microSD.
While smart-card readers and microSD readers are already on the market, they are generally stand-alone offerings and are considered cumbersome to use, Good officials said.
Good Vault is the first offering in Good's new line of Good Trust security products for identity and access management.
Good has more than 4,000 enterprise customers; Gartner and other analyst firms consider it to be one of the leading vendors of mobile device management systems.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen, or subscribe to Matt's RSS feed. His email address is email@example.com.
Read more about Mobile Device Management in Computerworld's Mobile Device Management Topic Center.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!