Is your password putting you at risk?

One major cause of data breaches is the stolen password. Once hackers have an email address and password, a world of possibilities are open to them. The dangers are not just limited to the account they have access to. Their hacker’s next steps usually include not only selling the details to other criminals but also “credential stuffing”; taking the login details for one account and trying it on others. Imagine if your ISP account was hacked – your work email, online shopping and other accounts most people possess would be targeted.

Companies would do well to introduce Two Factor or Multi-Factor Authentication to protect their employee and customer digital identities. Put simply, this requires another authentication criteria to be satisfied before granting access to a site or account. Many large corporates are turning to 2FA to help derisk their customer’s exposure to a data theft. Sony Playstation, Apple, Instagram, and Gmail all offer this additional security measure.

Simply put Two Factor Authentication, requires two out of three regulatory-approved authentication variables such as:

  • Something you know (such an email password).
  • Something you have (the physical bank card or an authenticator token, which can be hardware or digital).
  • Something you are (biometrics like your finger print or iris pattern).

The majority of attacks come from remote connections and 2FA can make distance attacks much less of a threat because accessing passwords is not sufficient for access and it is unlikely that the attacker would also possess the physical device associated with the user account. Take the Dropbox account holder hack for example. Hackers are unlikely to take your credentials and use them successfully on a second website if they are asked to provide a unique one-off code. It’s just too much work for them unless the gains are incredibly high. Each additional authentication factor makes a system more secure. Because the factors are independent, compromise of one account should not lead to the breach of others.

If your employer has a significant online presence, I would urge them to explore the potentials gains of 2FA. Of course KeyIdentity offers multiple solutions here, but irrespective of vendor the key principle is passwords alone are insufficient to provide adequate safeguards in the face of threats are expanding in scope and volume. Authentication should be able to perform whether you are online or offline, and in way that minimises user disruption. One of my favorite examples is Blizzard, the company who create games such as World of War Craft and Diablo, have a free authenticator, and it seems to work very effectively.

To sum up, if you want to avoid data about yourself, your company or organization and your customers being accessed:

  • Make your password non predictable and use unique passwords for each and every application
  • Check the privacy settings on any social media accounts, and turn them on if you haven’t already
  • Don’t use real birthdays and other identifiable data unless you really need to. Receiving a “Happy Birthday” email from a loyalty card provider a few days early or late is preferable to sharing a major personal identifier.
  • Do not enter easy answers to password forgetten questions. Best case choose something as answer that has nothing to do with the question at all. An example: What is the name of your dog? Answer:”I love companies that makes it so easy to attackers to steal my identity”.
  • Explore the benefits for 2FA or MFA inside your organization and look for it when you sign up for a new online service or similar.

Lastly, stay alert to any news of data breaches and immediately change your password or create a new account if you believe you have been affected. Don’t forget to also consider where else you may have used the same password and personal details. Hackers are constantly trying to get the better of us, so don’t give them any extra chances to succeed.

 

FIDO U2F: what it is and how you can secure your web applications using LinOTP

This is the first part of a series of blog entries about FIDO U2F and how you can use FIDO U2F and LinOTP to secure your web applications.

Kicking off, we would like to introduce you to FIDO U2F and explain the idea behind it. Following blogs will be about the protocols and how you can use LinOTP to integrate FIDO U2F in your application.

What is FIDO U2F?

FIDO U2F is a technical specification defining a mechanism to reduce the reliance on passwords to authenticate users. It can be used to enrich a password-based authentication with a second factor or to replace the password-based login completely, depending on the use case.

FIDO U2F is developed by the FIDO Alliance (KeyIdentity is a member) and actively extended to new authentication models and markets. The driving idea behind FIDO U2F is to allow the user to bring their own token to their registration process and allow you to securely validate the identity of the user going forward and the user only having to use one token for all websites without compromising security.

U2F_TheUserExperience

Source: FIDO Alliance

USB, NFC and Bluetooth are now defined as transport protocols and a wide range of devices is available to make use of them. Your users can decide on the method and vendor they prefer, based on costs, design or availability. The FIDO U2F implementation on the side of the web application is the same for all tokens implementing the FIDO specifications.

FIDO U2F is based on public key cryptography. When the user registers at your site, a key pair specific to your site is generated in the FIDO U2F token and, depending on the device, is stored on the token. The public key is then registered in your LinOTP backend. When the user authenticates later on, a challenge is presented to the FIDO U2F token and proof of the possession of the private key is presented by signing the challenge. The FIDO protocols are designed to protect the user’s privacy. It is not possible to track a user across services even though the same token is used.

The handling of the device and the communication with the USB, NFS or Bluetooth transportation protocols is provided by the user’s browser and built-in or available as a plug-in. Currently only Google Chrome has built-in support, but support by Microsoft and plug-ins for Firefox are available.

FIDO U2F is still a pretty young standard, but adoption is picking up. After being developed mainly by Google and Yubico, the FIDO Alliance now has an impressive set of members and the range of specifications grew actively and in interesting areas over the last year.

This was just a quick introduction, in the following parts we will look at the registration and authentication process and how an implementation of FIDO U2F can look.

 

Why biometric authentication isn’t a silver bullet

There has been a lot of noise in the press recently about the rising tide of biometric authentication. The concept has been around for longer than many might think. For example, facial recognition was tested at the Superbowl in 2001, though the results were not widely circulated.

A few pioneering companies (particularly banks) are rolling out biometric trials, such as Standard Chartered in Asia, with finerprint and later voice recognition. In Singapore in particular, two rivals have both piloted voice authentication, DBS for customers dialling their call centre and OCBC for transaction authentication.

It’s not surprising – think of all the positives; easy-to-use, unique to the user, hard to share, tied to the individual’s own physical attributes and frankly, „cool“, as there is a sense of this is how our identities should be verified in a digital age.

Nothing could be meet the „something you are“ requirement than your voice, fingerprint or retina, so how can there be any downsides?

No security solution is without its drawbacks, and in the face of the biometric bandwagon, awareness of the following challenges helps balanced decision-making with all of the facts to hand:

You can’t change a fingerprint or retina scan: whilst of course this is in one sense a strength, it’s also a weakness. If your fingerprint is stolen and then used elsewhere there could be major financial and other wider implications. Unlike refreshing a password, how do you create a new fingerprint? It’s not so easy.

Biometrics are hackable: yes, even your fingerprints are. Tsutomo Masumoto made a working model based on „gummy bear“ material, initially from a live fingerprint and later from a fingerprint left on a physical object.

Creepy vs cool: a recent retail study found signifcant dfferences aomgst consumers in how they viewed a store’s knowledge about them. Whilst some groups saw recognising them by name as they walked the floor as „cool“, others found the possession of certain information to be „creepy“. Not every user wants to share their physical details with a retail outlet for example.

Legalities: data security and privacy are seen as highly important in Germany, and whilst there are variations amongst countries in the way these topics are viewed, who holds biometric data, where they store it, how it is used, and which organisations they share this with have many political, ethical and legal implications, and given how new biometrics are, many legal precedents have not yet been established. Facial recognition is legal in many US states for example, yet in other parts of the world this may not be the case.

False positives: Imagine the accuracy of biometric readings is 98-99% – that’s pretty good, no? Not if you have 10,000 employees entering offices around the world or logging in each day. 98% accuracy means 200 colleagues will not be able to start work on time. Imagine an issue with a fingerprint sensor at an entry door to the building and the queue of impatient co-workers behind the unfortunate blocked user. How many security teams look forward to a mass resetting of entry systems?

Individual use vs high volume: whilst fingerprint recognition might work to access a personal smartphone, it may not be suitable for far higher volume authetication requirements. If hundreds of people are entering a building at the same time,

Don’t underestimate a hacker’s determination: with every new security technology announced, there is sure to be a group of hackers eagerly awaiting the challenge of overcoming it, biometric or not. Retina and facial recognition for example is already being tricked by hi-res photographs of the individual, 3D models and more. Phone calls can be recorded to capture voices, keyboard strokes recorded to learn the typing cadence, and so forth. Whilst this is a lot of work to crack each account, high net worth individuals or celebrities may be viewed as targets worth investing time in.

If you’d like to dive deeper into the topic, there is a great Wired article summarising the legal, technical and ethical complexity involved in biometric authentication.

In the meantime, review any authentication option with an open mind and keep asking the „What if?“ questions. Explore the volume of users, use cases and level of security required; not every solution matches every scenario.

 

Why it’s time to revisit your red and blue team approach

Anyone who has read the recent news of Yahoo’s data breach which affected around 500 million accounts will probably have questioned their own organization’s ability to defend itself against external attacks of all sorts.

The task of maintaining defences in the face of constant threats is often partly owned by two IT security groups, the “red”and “blue” team.:

Red: focused on testing the effectiveness of the organization by acting as hackers, using penetration testing techniques to identify and expose vulnerabilities. They will use offensive tools and use SQL injection, scan the network and be familiar with firewall and router commands.

Blue: take the role of defending the organisation, being constantly vigilant and ready to respond to any attacks. They will be expected to recognize unusual patterns, behaviours or outliers, and establish how and where attacks are about to take place. The blue team monitors the systems such as the central log file management system and  scans this for signs of attempted entry.

Whilst this role playing is a familiar exercise, there are potentially dangers if the approach is not regularly reviewed:

  • The mindset and culture developed in an organisation over time can inhibit fresh thinking both in terms of where and how to typically attack, and equally defend against these attacks. It does not prepare teams for a concerted attack by strangers who have no respect for the system.
  • Teams can become stuck in their ways and “go through the motions”, repeating similar attacks to the last role play.
  • As Einstein once said, “We can’t solve problems by using the same kind of thinking we used when we created them”. Unless exceptional, over time, many employees become conditioned by their surroundings and view situations based on their perception of established norms, and the prevailing culture. This can restrict fresh thinking and lead to a narrow testing focus.

    There a number of activities which can help keep the red/blue team sharp and effective:

  • Regular rotation: it is recommened to switch parts of each group g. 50% change sides on a frequent basis. This improves cross-team skills and also creates a view on how „the other half think“.
  • Full debriefs: after each game play has taken place, each team should explain and document how they were successful (either in attacking or defending), so learnings are formalised and captured.
  • Continuous learning: funds and time permitting, create an education budget for each team member where they can choose to attend a conference, external course or online learning and increase their knowledge base. It demonstrates investment in talent and also assists team morale.
  • Incentivise: introduce a trophy that is passed between teams (e.g. for not being hacked this quarter/half year etc), with the red and blue team exchanging ownership based on which was successful in the last role play.
  • Review the team composition: typically in a team of 10 people, three would be responsible for IT Sec Engineering, 5-7 would take a SecOps/Incident response (usually outsourced) role, and two would act as pen testers. How does your team’s make-up look?
  • Explore 3rd party participation: a real attacker doesn’t play by the rules or follow established thinking, and is going to overlook any rule, etiquette, company guidelines and ethical issues. Sometimes a genuine outsider approach is needed that does the unexpected, not permitted, daring or simply blindsides the blue team.

FOXMOLE’s penetration testing team has extensive experience in responsibly attacking client sites to identify weaknesses, whether based on an open brief or a speciifc area of concern.

The greatest opportunity offered by commissioning an external group is the discovery of pervasive, underlying vulnerabilities that have not been addressed as these were simply not on the radar. Remedial action plans can be developed in conjunction with clients, with scheduled progress review points.

 

 

An open source core: the answer to cryptographic back doors?

What is a cryptographic back door?

“A backdoor is an intentional flaw in a cryptographic algorithm or implementation that allows an individual to bypass the security mechanisms the system was designed to enforce. A backdoor is a way for someone to get something out of the system that they otherwise would not be able to. If a security system is the wall, a backdoor is the secret tunnel underneath it.”
How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer, by Nick Sullivan, January 6th 2014

For any organisation concerned at the possibility of cryptographic backdoors being built into the authentication solution they invest into, open source software (OSS) can be seen as offering an alternative, for several reasons:

  • A closed-source system is easier to contain malicious elements, because OSS has a greater potential of any risk areas being discovered by the open source community.
  • Contrary to the perspective that releasing code benefits attackers because hostile audiences can see OSS code, attackers are able to reverse engineer binary (proprietary) code patches in minutes and generate exploits. Security by obscurity has never been a solid approach. Multiple academic papers demonstrate how easy it is, „in some of the cases they tried, they claimed to be able to create an exploit in minutes after receiving the patch and comparing the patched version of the application with the unpatched version.“ https://isc.sans.edu/forums/diary/The+Patch+Window+is+Gone+Automated+PatchBased+Exploit+Generation/4310/
  • OSS offers the IT security team the opportunity to audit the code and conduct proper due-diligence.
  • OSS gives the IT security team the possibility to even adjust the code to their own needs if possible. Customers can, but do not have to, take part in the development of the code.
  • If source-code is public-available, and a maintainer stops working on it for whichever reason, it still can be developed and maintained by anybody else.

For any organisation concerned at the possibility of cryptographic backdoors being built into the authentication solution they invest into, open source software (OSS) can be seen as offering an alternative, for several reasons. A closed-source system is easier to contain malicious elements, because OSS has a greater potential of any risk areas being discovered by the open source community.

While proprietary vendors have argued that their software is more secure because it is secret, this can be countered with the view that closed source is so easy to use that weak crypto or implementing a crypto back door by selecting fixed numbers as parameters can occur, whilst in OSS this is not possible.OSS offers the IT security team the opportunity to audit the code and conduct proper due-diligence and even adjust the code to their own needs if possible.

With Open Source at its core, LinOTP reduces the risks associated with proporietary software.

 

 

 

Five typical enterprise security fails

At FOXMOLE, we have met with many large organisations and whilst they are all different in terms of their particular security challenges, there have been a number of commonalities observed:

Lack of mitigations

One example of this is the absence of a patch process, which is surprisingly frequent. Once a vulnerability with an internal or external application has been identified, how is a patch issued, and how quickly is the fix implemented? The issue is that the processes are not reoccurring as frequently as they should, leaving a window of opportunity for an attacker to compromise the system with known vulnerabilities. FOXMOLE has also observed that the patch process does not address all layers, for example only the server patches are applied, but not the service-layer, the used frameworks or the applications are part of it.

Too often we see either a piecemeal approach that only addresses part of the network, or a reinvention of the wheel each time – as if a patch has never occurred before. With attacks more than likely to succeed at some point (however small), it is time to factor in how these would be remediated so minimize the chance of reoccurrence.

Insider threat often underestimated

In modern company culture that often stress (rightly) collaboration, assumption of best intent and HR/privacy guideline adherence, it can be hard to stress the need to factor in actions by a disgruntled employee. A Forrester Research report, “Understand the State of Data Security and Privacy,” showed that 25% of survey respondents the most common breach occurred in the past year at their company derived from abuse by a malicious insider. If that insider has privileged account access, the risk is particularly significant.

One failure FOXMOLE sees in this respect is a focus on policies and the main solution. Companies tend to protect against external threats;  they patch every external server-system (available from the internet) and do not do that for internal systems (same applies to hardening…). In the end, the important systems (which often are not available from the internet such as SAP, HR-Systems, Customer Analytics,…) are in a weak security state (default passwords on the databases, old patch levels…). This means that anyone with access to the local network (an insider, subcontractor) has a very soft target which enables them to steal the data. In addition, if employees can bring their own devices (subcontractors with own laptops) they normaly have administrative rights with them and can bring their own attack tools and have all the time to exploit systems and extricate data – since no corporate compliance tool will typically check these BYOD devices.

Poor password practices

This seems like an old “classic”, but these present issues in multiple ways. A recent study in Luxembourg revealed that over 40% of respondents would share their passwords in return for chocolate. The significance of handing over a password still seems not resonate. Sharing password for admin accounts may be convenient and time-saving but presents major risks. Another challenge is laziness in creating passwords themselves, with “123456” or “welcome” remaining popular and of course easily hackable choices. Whilst it is hard to remember a wealth of complex passwords in work and personal life, using “password” for example, is not the smartest idea.

Linked to this is the fact that few companies seem to enforce strong passwords, or do not store the passwords in a secure manner (bcypt, scrypt with salts). It is essential to combine strong password policies with frequent password change requirements that will decrease the selected passwords to avoid predictability! Recent research showed that 63% of confirmed data breaches involved weak, default or stolen passwords.

General awareness of security

This may seem like a catch-all topic, but it’s really just a simple mindset issue. It’s about taking care of the basics such as locking the desktop, vetting sub-contractors, challenging non-familiar faces, not allowing visitors to walk around the building unescorted and not leaving valuables in the office. One service FOXMOLE offers is the “evil cleaner”; which involves consultants spending five minutes in an employee’s office to see how much could be taken by regular office presence with bad intentions.

Adherence to manual approaches

In a app-driven world, it is still a shock to witness the lack of automating of security and the modeling of this all into all processes. Addressing human weaknesses such as errors, laziness, absence of a repeated and consistent approach through automation is essential as the type, volume and complexity of security threats increase. FOXMOLE has observed on multiple occasions an absence of a defined, transparent and robust security framework.

There are no doubt many other common failings – look out for some more observations in a future blog!

LSE announces a number of new product updates for multi-factor authentication

Germany-based LSE Leading Security Experts GmbH, a holding of MAX21 Management und Beteiligungen AG (stock market symbol: MA1, ISIN: DE000A0D88T9), will expand its family of adaptive multi-factor authentication products during the second quarter of 2016. Among other updates, an offline authentication facility will be gradually integrated into the product suite. Unlike conventional OTP tokens, this new approach enables strong authentication even without a direct connection to the LSE LinOTP server.

LSE LinOTP Offline Authentication

This cross-product feature will allow companies to provide mobile workers with a secure form of offline authentication. This is particularly relevant for employees who travel a lot, or who work abroad without a direct connection to the company’s network and thus the backend OTP server. “Previously, secure two-factor authentication methods with OTP were limited to devices with a permanent network connection. Now mobile devices such as notebook computers can also be protected with real and cryptographically valid multifactor authentication schemes,” says Sven Walther, Managing Director and CTO of LSE Leading Security Experts GmbH.

Unlike other solutions being marketed, the process developed by LSE does not require secret material to be stored on the system being authenticated. The feature will become available to customers during the second quarter of 2016 through update releases of LSE LinOTP, LSE LinOTP authentication providers, and the new LSE LinOTP multi-token app.

LSE LinOTP Multi-Token App: OATH compliant

The LSE LinOTP multi-token app is an integral component of the new LinOTP family of offline authentication products. In addition to the LSE LinOTP QR token, the multi-token app supports tokens for OATH TOTP and HOTP and is therefore compatible with all OATH-based systems (like Google, Dropbox, Github, and many others). Access to the app’s data is password-protected by default. Key data can be transmitted in conjunction with LinOTP in a separately protected secure roll-out process. Initially, this solution will be available for iOS and Android.

RPM packages for simplified installation of Red Hat-based systems

During the second quarter of 2016, LSE will provide its customers with LinOTP repositories containing RPM packages. This expands the support of packaged deployment to systems based on RHEL 7 and RHEL 6. The installation for Red Hat-based systems will be streamlined and allows faster deployment using various optimized configuration templates. The LSE LinOTP RPM packages for RHEL 6/7-based systems supplement the LSE range of packages for Debian “Jessie” 8, Ubuntu 12.04, and Ubuntu 14.04.

LSE LinOTP authentication provider for Microsoft Windows and OS X®

In the course of regular product updates, the family of LSE LinOTP authentication providers will expand to include the OS X® operating system in addition to the Microsoft Windows and Linux operating systems, and for the first time offer OS X® strong offline authentication with access to LSE LinOTP. The LSE LinOTP authentication provider for Microsoft Windows will be enhanced to allow a direct connection of the LinOTP API via encrypted channels based on HTTPS.

About LSE Leading Security Experts GmbH

Since its establishment in 2002, LSE Leading Security Experts GmbH, based in Darmstadt / Weiterstadt, has made a name for itself as a leading manufacturer in the field of login security and user authentication as well as a provider of consulting services in the security industry. Within the company there are two independent operating divisions: The first division specializes in adaptive multi-factor authentication (MFA/2FA) and the specially developed open-source LSE LinOTP technology, the second division provides penetration testing, vulnerability assessment and code review services. Customers of LSE include national and international corporate customers, financial institutions, government agencies, and small and medium-sized enterprises. LSE is a part of the listed MAX21 group of companies (MA1).

Strategische Entscheidung für sehr hohes Sicherheitsniveau: Die Bedag Informatik AG setzt auf Multi-Faktor-Authentifizierung mit LSE LinOTP

Die LSE Leading Security Experts GmbH hat mit der Bedag Informatik AG eine Partnerin gewonnen, die als führendes Schweizer IT-Dienstleistungsunternehmen gilt und die hauptsächlich öffentliche Verwaltungen und Betriebe der Schweiz, Unternehmen im Gesundheits- und Versicherungswesen sowie UN-Organisationen zu ihren Kunden zählt. Die Firma befindet sich zu 100 Prozent im Eigentum des Schweizer Kantons Bern.

Die Bedag setzt LinOTP bereits in ihrem eigenen Unternehmen ein und hat die LSE-Multi-Faktor-Authentifizierung zuletzt auch bei der Verwaltung des Kantons Bern integriert. Der Einsatz von Zwei-Faktor- oder Multi-Faktor-Authentifizierung (MFA/2FA) bei LinOTP ist für Kunden dabei eine strategisch wichtige Maßnahme, um höchsten Ansprüchen an die IT-Sicherheit zu genügen.

Durch die Verwendung von Einmalpasswörtern (OTP = One Time Password) ergänzt LSE LinOTP bereits vorhandene Komponenten um die Abfrage mit einem weiteren Faktor, dem Einmalpasswort, erstellt durch OTP-Generatoren, mit Hardware-Token, Smartphone App, per E-Mail oder SMS. LSE LinOTP kann für die unterschiedlichsten Szenarien genutzt werden, bei denen eine hohe Anmeldesicherheit erwünscht ist, so die Anmeldung an Web-Diensten und -Portalen, VPN­Lösungen, Terminalservern, Clients, oder kundenspezifischen Anwendungen, aber auch für Cloud­Dienste und BYOD-Nutzungsmodelle (Bring Your Own Device).

Die Bedag hat für den Kanton Bern eine Standortlizenz (Site License) für eine unlimitierte Anzahl von Token bei der LSE erworben. Die Lösung der LSE – bestehend aus LSE LinOTP in Kombination mit der LSE LinOTP Smart Virtual Appliance – konnte sich im Rahmen einer vorangegangen, ausführlichen Evaluierung behaupten. Im ersten Schritt des allgemeinen Rollouts, der derzeit bereits erfolgt, liegt der Hauptfokus auf Applikationsanbindungen per Radius-Protokoll sowie auf der Einbindung der Citrix-Gateways, der Microsoft Outlook Web App (OWA) und der Mobilitätslösungen in das neue Sicherheitskonzept. Schwerpunkt dabei sind zunächst die Remote-Zugänge. Derzeit werden etwa 15.000 Arbeitsplätze des Kantons Bern umgestellt, um das hohe Maß an Sicherheit zu gewährleisten, welches im Umgang mit Personen-, Steuerdaten usw. unabdingbar ist.

„Die Bedag hat sich bewusst für die Multi-Faktor-Authentifizierungslösung LSE LinOTP entschieden. Dieses Open-Source-Produkt überzeugt uns durch seine transparente Technologie, Herstellerunabhängigkeit, Supportqualität und Kosteneffizienz. Ein wichtiger Faktor ist ferner die Mehrsprachigkeit. Neben Deutsch und Englisch punktet LSE LinOTP mit Französisch, was für Kunden in der mehrsprachigen Schweiz sehr wichtig ist“, erklärte Peter Schmutz, CEO der Bedag Informatik AG.

„Wir freuen uns sehr über diesen bedeutenden Auftrag aus der Schweiz, der über unseren LSE-LinOTP-Partner Bedag zustande gekommen ist. Datenschutz und Datensicherheit sind gerade in der öffentlichen Verwaltung ein großes Thema. Die sichere Benutzeranmeldung mittels starker Authentisierung ist eine entscheidende Komponente im Gesamtsicherheitskonzept von Behörden, aber auch Unternehmen. Die plattformübergreifende Lösung mit LSE LinOTP hilft, solche Sicherheitsziele erfolgreich umzusetzen“, kommentierte Sven Walther, Geschäftsführer und CTO der LSE Leading Security Experts GmbH.

Über LinOTP          

LSE LinOTP ist eine adaptive Multi-Faktor-/ Zwei-Faktor-Authentifizierungslösung (MFA/ 2FA), welche herstellerunabhängig verschiedenste Verfahren, Token und Tokenformfaktoren unterstützt. Dank der hochmodularen Architektur bietet LSE LinOTP ein breite Anbindung von Authentisierungsprotokollen, Datenbanken und Schnittstellen . Die für Transparenz stehende Open Source-Technologie der LSE ist mandantenfähig, leicht skalierbar, bedienerfreundlich und lässt sich durch die LSE LinOTP Smart Virtual Appliance (SVA) schnell und einfach integrieren. Mit Hilfe von LSE LinOTP Enterprise Lösungen können Unternehmen höchste Sicherheitsanforderungen in Ihrer Produktivumgebung mühelos durchsetzen.

Über die LSE Leading Security Experts GmbH

Die LSE Leading Security Experts GmbH mit Sitz in Darmstadt/Weiterstadt hat sich seit ihrer Gründung im Jahr 2002 einen Namen als führender Hersteller im Bereich Anmeldesicherheit und Benutzerauthentifizierung sowie als Consulting-Dienstleister in der Security-Branche gemacht. Innerhalb des Unternehmens operieren zwei Geschäftsbereiche unabhängig voneinander: Der erste Bereich ist auf die adaptive Multi-Faktor-Authentifizierung (MFA/2FA) mit der eigens entwickelten Open-Source-Technologie LSE LinOTP spezialisiert, der zweite Bereich bietet Penetrationstests, Schwachstellenanalysen und Code Reviews als Dienstleistung an. Zu den Kunden der LSE zählen nationale und internationale Großkunden, Finanzinstitute, Behörden sowie mittelständische Unternehmen. LSE gehört zur börsennotierten MAX21-Unternehmensgruppe (MA1).

Über die Bedag Informatik AG

Die Bedag ist mit einem Umsatz von über 100 Mio. Franken ein führendes schweizerisches IT-Dienstleistungsunternehmen. Mit über 400 Mitarbeiterinnen und Mitarbeitern – wovon über 20 Lernende – verfügt sie über ein breites und fundiertes Informatik-Know-how. Ihr Kerngeschäft ist die Entwicklung, die Wartung und der Betrieb von geschäftskritischen Informatiklösungen. Damit ermöglicht sie ihren Kunden einen wirtschaftlichen und sorgenfreien Informatikeinsatz. Mit einem Netz von hochsicheren Rechenzentren sowie Standorten in Bern, Aarau, Delémont, Genf, Lausanne und Wettingen ist sie regional stark präsent. Ihre Kunden sind hauptsächlich öffentliche Verwaltungen und Betriebe, Unternehmen im Gesundheits- und Versicherungswesen sowie UN-Organisationen. Die Bedag wurde 1990 gegründet und befindet sich im Eigentum des Kantons Bern.

Weitere Informationen unter:

www.lsexperts.de
www.linotp.org

www.bedag.ch

LSE introduces the new version of its multi-factor authentication and OTP solution: LinOTP 2.8.1 supports multiple languages and has improved features

LSE Leading Security Experts GmbH is introducing LinOTP 2.8.1, the latest version of its vendor independent solution for adaptive multi-factor and 2-factor authentication and OTP processes (OTP: one time passwords).

LSE is now offering its latest LinOTP version in Spanish, French, Italian, and simplified Chinese in addition to the previously available English and German. In addition to the expanded available languages, LinOTP 2.8.1 has new features for monitoring and improved capabilities for server migration and complex setups. The improved user filters and support for HSM (hardware security module) migrations are also new.

With the additional languages, LSE has consistently continued to internationalise the LinOTP product line. The larger selection of available languages applies to both the self-service user portal as well as the management interfaces. “We appreciate the opportunity to provide more users worldwide with multi-factor- or two-factor-authentication,” states Sven Walther, Managing Director and CTO of LSE Leading Security Experts GmbH.

New options for monitoring

LSE is introducing a new API for monitoring internal LinOTP processes with LinOTP 2.8.1. This provides, for example, information on the statistics and the status of the tokens, the status of the HSM (hardware security module) encoding, and the status of the UserIDResolver with configurable permissions.

Improved features for server migration and complex setups

Previous features for routing registration data to other authentication servers have been improved with options for generic routing. This means migration scenarios and complex setups with multiple LinOTP instances are easier to model and administer.

Improved user filters

Today’s enterprise environments require a differentiated approach to user policy management. LinOTP 2.8.1 adds options for managing the configurations and policies based on user groups, user attributes, and regular expressions. This considerably simplifies detailed and complex permission scenarios in the setup.

 

HSM migration

In the new version of LinOTP it is now possible to migrate an HSM or a corresponding HSM cluster. LinOTP 2.8.1 includes features and tools to migrate data between two HSMs and thus makes it easier to update the HSM hardware. LinOTP supports PKCS#11-based HSM systems such as the SafeNet Network HSM (previously Luna SA).

About LinOTP                                        

LSE LinOTP is an adaptive multi-factor/two-factor authentication solution (MFA/2FA) that supports a wide variety of processes, tokens, and token form factors independent of the manufacturer. Thanks to high-module architecture, LSE LinOTP offers wide connectivity for authentication protocols, databases, and interfaces. The transparent open source technology of LSE Experts is client-capable, easily scalable, user-friendly, and can be quickly and easily integrated via the LSE LinOTP Smart Visual Appliance (SVA). By using LSE LinOTP Enterprise solutions, companies can effortlessly implement the highest security requirements in their productive environment.

About LSE Leading Security Experts GmbH

LSE Leading Security Experts GmbH, based in Darmstadt/Weiterstadt, has been making a name for itself since its foundation in 2002 as a leading manufacturer in the area of registration security and user authentication as well as a consulting service provider in the security sector. Within the company, two business areas operate separately from each other: the first specialises in adaptive multi-factor authentication (MFA/2FA) with the company-developed open source technology LSE LinOTP. The second offers penetration tests, vulnerability assessments, and code reviews as a service. Customers of LSE Experts include national and international major clients, financial institutes, authorities, and SMEs. LSE Experts are part of the listed MAX21 company group (MA1).

RSA Conference 2016: LSE introduces “LSE LinOTP Authentication Provider” for OS X® Operating system

Open Source:

Germany-based LSE, Leading Security Experts GmbH, a part of MAX21 Management group of companies (stock exchange symbol: MA1, ISIN: DE000A0D88T9) will be represented at RSA Conference, the world’s leading conference for IT Security in San Francisco, at booth #S815 South Expo as an OATH organization (initiative for Open Authentication) from February 29 to March 4, 2016. During this international event, LSE will present their latest product expansion for the OS X®operating system, “LSE LinOTP Authentication Provider”, which is the first adaptive multi-factor authentication (MFA/2FA) product for Mac platforms.

With its LSE LinOTP Authentication Provider, LSE is expanding the portfolio of existing authentication provider products for Microsoft Windows and Linux operating systems to OS X®. This token solution enables implementation on a cross-platform and cross-technology basis. The new product improves the login security with a One-Time Password solution (OTP). LSE LinOTP backend supports all existing OTP implementations, such as mobile apps (Google Authenticator, FreeOTP) and tokens (i.e. OATH, Yubikey). The configuration is done via an integrated OS X® Environment native configuration dialogue. Thanks to LSE LinOTP, adaptive multi-factor authentication (MFA/2FA) is being expanded to Mac environments.

LSE LinOTP Authentication Provider communicates with LinOTP backend via an encrypted HTTPS connection, which allows for high-availability scenarios with round-robin or load-balancing scenarios.

LSE will be represented as an OATH organization (Initiative for Open Authentication) at the RSA Conference, February 29 – March 4, 2016 at booth #S815 South Expo.

[OS X® is a registered trademark of Apple, Inc.

Microsoft and Windows are registered trademarks of the Microsoft Corporation in the US and other countries]