Software enables users to perform token management tasks.

Press Release Summary:



Freeing up IT staff, Authentex® Strong Authentication System, ASAS® v3.1.0.1, enables organizations of all sizes to authenticate network and Web users, secure email, and ensure that data taken on road is safe from loss or theft. With Self Service Center module, IT adds user data in .csv file to ASAS® Database, then sends out new tokens to users, who in turn access ASAS Self Service Center to initialize tokens.



Original Press Release:



The Authenex Strong Authentication System (ASAS) Gives Administrators a Break, by Enabling Users to Perform Routine Token Management Tasks



New Self Service Center module reduces IT costs and frees up IT staff by enabling users to perform basic A-Key token management and deployment tasks.

HAYWARD, Calif., July 16 /-- Authenex(R) (a leading provider of cost-effective and strong e-security applications) has announced the release of version 3.1.0.1 of its acclaimed ASAS(R) System, including a new module that enables users to easily perform basic A-Key token deployment and management tasks.

The Authenex(R) Strong Authentication System (ASAS(R)) enables organizations of all sizes to authenticate network and Web users, secure email and ensure that data taken on the road is safe from loss or theft. It is easy to install and administer, freeing up IT staff in large companies and empowering small companies with limited IT resources.

"This is the module that many organizations have asked for. It really steps up the convenience of the ASAS(R) System, while saving organizations money and time," said William Chen, V.P. of Sales at Authenex.

The savings result from easier deployment and maintenance of A-Key tokens. For example, simplified deployment of new A-Key(R) tokens: IT adds user data in a .csv file to the ASAS(R) Database (or pulls the data directly into the database via LDAP), then sends out new tokens to users. The users then access the ASAS(R) Self Service Center, initialize their tokens and they are ready to go. Or, to replace a lost or stole token, a user logs into the Self Service Center and reports the lost or stolen token, gets a temporary OTP number to use until a replacement token arrives and (when it does arrive) uses the Self Service Center to initialize the replacement.

"Authenex has always been about the peace of mind that comes with knowing your critical data is safe and accessed only by those you want to give access to. Now, we can also give administrators a break and reduce IT overhead as well. It doesn't get much better than that," said Paul Lin, CEO of Authenex, Inc.

About Authenex, Inc.
Authenex has developed the most cost-effective, secure and easy-to-use platform for strong (two-factor) authentication, making it possible for enterprises and PC-users to afford and deploy the highest standards in network security. The Authenex suite of applications includes Strong Authentication for VPN, LAN and Web; Strong Web Access Control; End Point (File and Hard-Drive) Encryption; Secure File Exchange, and Secure Certificate Storage. Each leverages the chip-based A-Key token, providing simplified management and use. Combined authentication features are offered in the A-Key token, enabling One-Time Password, PKI or Challenge-Response authentication from one token.

For more information, call 1-877-AUTHENEX, or visit http://www.authenex.com/.

Authenex, A-Key, ASAS, SAC, HDLock, ASafe, ACert, A-Remote and associated logos are registered or unregistered trademarks of Authenex, Inc. All other registered and unregistered trademarks in this document are the sole property of their respective owners.

CONTACT: Dave Damianakes of Authenex, +1-510-324-0230, or ddamianakes@authenex.com

All Topics