View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
July 21, 2009

RSA introduces SecurID Software Token for iPhone devices

Provides two-factor authentication to enterprise applications and resources

By CBR Staff Writer

RSA, the security division of EMC, has introduced its SecurID Software Token for iPhone devices that reportedly enables an iPhone to be used as an RSA SecurID authenticator, providing two-factor authentication to enterprise applications and resources.

The company said that its SecurID Software Token App is available on the App Store. Its SecurID software token seed as well as Authentication Manager – the software that supports the company’s SecurID system – are now available for purchase, worldwide.

According to the company, its new SecurID Software Token for iPhone is designed to generate a one-time password that changes every 60 seconds, enabling secure access to enterprise applications and resources. The product is expected to complement the existing range of authentication methods offered by the company, giving customers a choice in the way they assure identities to a system, resource or information based on risk.

Through a download from the App Store, the software token application can be installed on the user’s iPhone. Users can enable the App with a software token seed provided by their IT organisation, reportedly creating a secure authenticator.

The use of RSA SecurID software tokens is expected to help decrease total cost of ownership for organisations as they do not require any physical shipping, they can be revoked and redeployed if an iPhone is lost, eliminating the need for replacement tokens.

Tom Corn, vice president of product marketing at RSA, said: We are further demonstrating our commitment to innovation and choice in authentication methods with the availability of the RSA SecurID software token for the iPhone for use within the enterprise. Since there is no ‘one size fits all’ security solution, RSA offers a full range of methods to authenticate and store credentials that balance cost, end-user convenience and security.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU