Crypto-server 6.4 Solution Awarded the Maximum Rating

CRYPTOCard has been awarded the maximum rating for performance, ease of use, and security in a Federal Computer Week (FCW) product review. FCW was especially impressed that CRYPTOCard's CRYPTO-Server 6.4 provides a flexible two-factor authentication solution that makes it simple for Windows, Mac, or Linux users to positively identify themselves to the system.

CRYPTO-Server 6.4 was praised for taking the pain out of passwords by both simplifying administration for a wide variety of token form factors and supporting portable devices. The review stated that as the CRYPTO-Server controls network access via a token, which generates a random password for every logon attempt, users are not under any pressure to change passwords. Also, administrators can rest assured that no one can intercept passwords during transmission over the network as users confirm their PIN on a specific device without transmitting it to the CRYPTOCard server.

The review explained that CRYPTO-Server integrates easily with other resources as available software lets administrators extend its use to controlling access to local-area networks, virtual private networks, Web servers, and other security systems. FCW also liked CRYPTO-Server's new support for disconnected laptop computers, commenting that when a laptop is off-line it is still protected by CRYPTO-Server authentication, and that someone can perform as many as 100 log-ons before needing to reconnect to the CRYPTOCard server.

FCW's product review follows a recent Butler Group report that also commended CRYPTOCard for providing a simple and cost-effective alternative to weak static passwords.

Developed to meet real-world requirements where Linux and Mac workstations often live in a mixed Windows domain, with Windows clients and Apache or IIS Web servers CRYPTOCard's event-based two-factor authentication tokens make it simple and cost effective to eliminate weak static passwords by generating a random password for every logon attempt. One-time passwords cannot be reused by hackers and do not need to be memorized by users eliminating the help-desk costs associated with resetting forgotten passwords, and the security risk resulting from users writing them down.

write your comments about the article :: 2006 Computing News :: home page