View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
January 26, 2010

VeriSign unveils new identity protection mobile app on Verizon wireless phones

Claims to transform wireless phones into security credentials

By CBR Staff Writer

VeriSign has launched VeriSign Identity Protection (VIP) Access for Mobile, which it claims to transform mobile devices into VIP authentication credentials that help customers protect their online data.

The company said that the new application displays a security code on a mobile phone that customers can use as a second factor of authentication in addition to usernames and passwords when accessing online accounts. The security code acts as a one-time password that changes automatically every 30 seconds.

According to Verizon, the new offering allows mobile users to access applications directly from their phones. It enables small to medium-sized businesses (SMB) and large enterprises to provide secure remote log-in to corporate intranets, partner portals and virtual private networks as well as consumer online banking and mobile payment services.

By leveraging the cloud-based service, the VIP Authentication Service delivers lower total cost of ownership, fast deployment of two-factor authentication, and improved ease of use for IT administrators and end users of online businesses, the company claims.

Kerry Loftus, vice president of user authentication at VeriSign, said: Bringing VIP Access for Mobile to Verizon Wireless customers dramatically broadens the footprint of VIP authentication and puts a powerful tool against identity fraud into the hands of millions of mobile users. We’re proud to work with Verizon Wireless, the leading wireless provider, to deploy strong authentication with an application that makes these safeguards fast, easy and free for subscribers to install and use.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU