Article posted: Oct 16, 2018

By Joakim Thorén, CEO

It's official: Version 5.3 of vSEC:CMS, a powerful new iteration of our industry-leading identity and access management solution, is now available. This version includes support for additional popular Gemalto eTokens and smart cards, and offers a slew of additional important features, including the ability to speed new user validations and enable license and Operator Store issuance.

Continue Reading...

Article posted: Jul 25, 2018

By Adam Bostwick, Business Development

When Microsoft announced it would cease support for its Forefront Identity Manager (FIM), its identity and access card management system, and its successor product, Microsoft Identity Manager (MIM), we geared up to help those customers seamlessly migrate from FIM/MIM to the Versasec vSEC:CMS.

Continue Reading...

Article posted: Jul 18, 2018

By Joakim Thorén, CEO

Cisco's 2018 Annual Cybersecurity Report points out that mobile devices are the most difficult to protect. That's in large part because of increased use of Bring Your Own Devices (BYOD) into the workplace. While organizations can save up to $350 per phone, per employee, by allowing the use of BYOD devices, there are inherent security challenges. When employees download apps from questionable gaming sites that are more likely to be breached, they leave a window for hackers to enter corporate servers and steal valuable organizational data.

Continue Reading...

Article posted: Jul 17, 2018

By Joakim Thorén, CEO

We're committed to building strategic partnerships with the best security companies around the globe. Today, we announced today our new technology partnership with Identiv, a global provider of physical security and secure identification solutions.

Continue Reading...

Article posted: Jul 10, 2018

By Joakim Thorén, CEO

We're delighted to announce Sven Hammar has joined our Board of Directors. He was named to the post at our company's annual general meeting last month. On a personal level, I couldn't be more pleased. Sven has been a friend and mentor to me for many years. For Versasec, landing someone who is a noted industry luminary is a major coup.

Continue Reading...

Article posted: Apr 19, 2018

By Joakim Thorén, CEO

The RSA Conference 2018 this week in San Francisco was our launching pad for vSEC:CMS S-Series Version 5.1. This latest upgrade to our identity and access management (IAM) solution has a strong focus on Virtual Smart Cards, TPM management, and Remote Security Device Management (RSDM) functionality, making it increasingly relevant in the Internet of Things (IOT) space.

Continue Reading...

Article posted: Dec 11, 2017

Q&A with Jeff Ciraulo, President, Envoy Data Corporation

We're pleased to offer a fourth installation of our quarterly partner blog series. We recently spoke with Jeff Ciraulo, Envoy Data Corporation's President, and he provided valuable insights on the two-factor authentication market and discussed why cloud services will need strong two-factor identification.

Continue Reading...

Article posted: Aug 17, 2017

By Nick Budden, Versasec Technical Consultant

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 21, 2017

By Joakim Thorén, CEO

It seems lately that more countries are turning to biometrics to ensure the safety of their borders. This January, Australia vowed it will replace passports as a means of identifying passengers after installing the latest biometric identification platforms, such as facial, iris or fingerprint recognition systems by 2020.

Continue Reading...

Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: May 03, 2017

By Nick Budden, Partner and Security Expert at Versasec

A recent BBC.com article pointed out Public Key Cryptography (PKI), created by researchers at Stanford University in 1977, is celebrating its 40th birthday. The findings of the Stanford team were nearly silenced by a US government agency at the time, which viewed this research as "legally equivalent to exporting nuclear arms to a hostile foreign power."

But why did the US think that sharing PKI research was so damaging to national security?

Continue Reading...

Article posted: Apr 17, 2017

By Joakim Thoren, CEO

Version 4.8 of our flagship product, vSEC:CMS is here, and this latest version incorporates more options for managing security credentials on the user side. In the latest iteration of the vSEC:CMS S-Series, the primary changes our customers will see relate to user self-service improvements.

Continue Reading...

Article posted: Apr 12, 2017

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Apr 11, 2017

By Joakim Thoren, CEO

Analyst research firm International Data Corporation (IDC) says companies are prepared to spend more money on their security this year. Its recently updated Worldwide Semiannual Security Spending Guide, forecasts worldwide revenue for security-related hardware, software and services will reach $81.7 billion in 2017, an increase of 8.2 percent over 2016. IDC's Spending Guides provide a granular view of key technology markets from a regional, vertical industry use case, buyer, and technology perspective.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Mar 10, 2017

By Marcus Hartwig, GM Americas

Google's Nest thermostat and other consumer IoT devices are flooding the market. By 2020, Cisco predicts 50 billion IoT devices will be connected. Not surprisingly, security is a major concern for these connected devices. After all, no one likes the idea of hackers infiltrating smart devices, like DVRs or cameras, the very devices that were hacked to bring down DynDNS last October.

Continue Reading...

Article posted: Mar 01, 2017

By Marcus Hartwig, GM Americas

For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.

Continue Reading...

Article posted: Jan 31, 2017

By Joakim Thoren, CEO

There's nothing like a regime change to expose where government could beef up its cybersecurity efforts. Nowhere is that truer than in the US today, where the Donald Trump presidency is vowing for much stronger protections for the government's data.

That's welcome news to anyone but enemies of the US, and it's a trend more and more enterprises of all sizes are embracing as well. And if they take advice from security experts, they will implement multiple-factor user authentication. It's among the easiest and most effective means for protecting an organization's most valuable assets, and with help from companies like Versasec, managing the setup, cards, credentials and more is simple, cost effective, and keeps their data protected.

Continue Reading...

Article posted: Jan 23, 2017

By Joakim Thoren, CEO

More than nine out of 10 organizations are using two-factor authentication to protect at least one application, according to a recent Gemalto survey on Authentication and Identity Management. Gemalto polled 1,150 IT decision makers from around the globe in late 2016 to gain insights into organizations' identity and access management practices. The poll results are welcome fodder for security companies who have been saying all along that multiple-factor user authentication is among the easiest and most effective means for protecting an organization's most valuable assets.

Continue Reading...