As a proof of ongoing work towards becoming industry leader in supporting open authentication standards, RCDevs is now proud to announce support for FIDO2 in its awards winning OpenOTP MFA platform.
RCDevs has rapidly grown its reputation in Luxembourg in the last year and concluded many local deals in various sectors. This includes several European institutions, banks, investment funds and major government / public sector services.
The new RCDevs' SpanKey solution is now ready for sale. SpanKey is a client-server solution which provides seamless AD accounts' integration into your Linux environments, SSH access without key distribution and user session recording. SpanKey is licensed per server and packages are sold on RCDevs'
The FIDO Alliance has expanded its certification program to include multi-level security certifications for FIDO authenticators (such as physical security keys and biometrics).
MFA-VPN is the first enterprise VPN appliance to support the FIDO standard! As such, MFA-VPN can optionally authenticate users with Yubikey U2F devices. By combining OpenOTP flexible OTP methods and FIDO-U2F, MFA-VPN is also the world’s most advanced VPN server in terms of strong authentication
Swipe to login, tap to accept or push to login, the de-facto two-factor login of today has many names.
As it now stands, any company with a web service can easily inaugurate two factor, without being pulled into myriad of obstacles lurking in shadows of corporate identity and access. There aren’t great many myriads around what in technical terms is called push login, a
Recently discovered vulnerabilities in machine hardware have raised questions about hackers being able to gain access to passwords and other valuable data. The vulnerabilities are known to effect every processor made in the last 20 years.
Oracle has released its first update round of the year, which includes fixes for products affected by one of the recently disclosed Spectre CPU vulnerabilities.
A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give man-in-the-middle attackers access to encrypted messages.
For those of us in the real world, this is a reminder that although prevention is better than cure, giving up shouldn’t be an option with a prompt reaction to a security violation, there may yet still be time to head the attacker off at