CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH Feature

December 26, 2012

ArrayShield's Two Factor Authentication Integrates Application Virtualization and Virtual Desktop Infrastructure

ArrayShield recently announced that its two-factor authentication platform can now easily and securely integrate application virtualization and virtual desktop infrastructure. ArrayShield is a specialist provider of innovative pattern-based Two Factor Authentication solutions.

In a statement, Rakesh Thatha, CTO at ArrayShield, said, "With many enterprises leveraging virtualization for their applications as well as desktops to increase efficiency and reduce costs, it is imperative that their organization threat landscape will become more complex and risk levels increase. Securing data in virtualized environment opens up new challenges and Two Factor Authentication addresses it effectively. In fact, we are seeing a very huge demand for Two Factor Authentication for virtual infrastructure. Working with multiple customers in securing their virtualized infrastructure over last six months we have built all the necessary interfaces and automated the deployment and integration process smooth and painless. ArrayShield enables organizations to achieve strong authentication across their virtual infrastructure in shortest span of time providing maximum ROI."

While leveraging virtualized desktop infrastructure, users are provided with a remotely accessible central "virtual" desktop, which delivers advantages such as simplified user PC management. However, there is always the danger of weakened security of all IT resources in case identify of the user is compromised. This is where a two-factor authentication solution becomes essential for virtualization infrastructure. Many times special access to the hypervisor can compromise the security of virtual assets such as servers, switches. This is why organizations are keen on strong authentication which can secure the user identities.

ArrayShield’s pattern-based Two Factor Authentication has been developed as a cost-effective and easy-to-use solution that is based on sequential pattern recognition and incorporates a translucent card for secure identification of users. Users simply select a memorable pattern for their secret code and are required to carry a unique translucent card.  During each log-in, the computer screen will pull up an array of random characters. The user then has to overlap the ArrayCard and enter the values featured in their remembered pattern. This is how a secure, one-time secret-code is created at each login which is rendered useless after each use.  

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO Miami 2013, Jan 29- Feb. 1 in Miami, Florida.  Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.




Edited by Rachel Ramsey
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter