Token provides mobile data security.

Press Release Summary:



Providing up to 1 Gigabyte of encrypted data storage, driverless v4 A-Key® can be taken anywhere and used on any PC. Device enables up to 2 levels of password management, either just user level or both administrator and user levels. Since A-Key® requires authentication before it can be used, any files or data stored on token cannot be seen or used by anyone but authenticated user. If someone tries to log on to token and fails predefined number of times, hardware will self-erase.



Original Press Release:



Authenex Delivers Mobile Data Security Breakthrough



The v4 A-Key(R) token serves as a strong authentication device, and provides up to 1 Gigabyte of encrypted portable data storage; thus giving users total mobility, while ensuring they can remain productive and secure - wherever they are.

HAYWARD, Calif., March 30 / -- Authenex, a leading provider of affordable and strong authentication e-security applications, announced today the release of the v4 A-Key(R) token. The driverless token can be taken anywhere and used on any PC, because it does not require any installation of software or drivers. The easy-to-use token is true plug and play.

"I can sleep better now, knowing that while my workers are on the road or at home, they are protected by the new v4 A-Key(R) token," said Paul Lin, founder and CEO of Authenex. "Since our token does not require installation, our users are free to work wherever they want, even on public PCs at airports."

The v4 A-Key(R) token enables up to two (2) levels of password management: either just the user level or both the administrator and user levels. This enables a greater degree of control over how the token can be used and by whom.

Since the A-Key(R) token requires authentication before it can be used, any files or data stored on the token cannot be seen or used by anyone but the authenticated user. The token contains up to one (1) Gigabyte of encrypted storage for user data, such as certificates, documents, single-sign on credentials, etc. All data is encrypted on-the-fly by AES encryption at the hardware level.

The storage on the token is also protected against brute force penetration: the hardware will self-erase if someone tries to log on to the token and fails a predefined number of times. This ensures that, in case of loss or theft, organizations have the peace of mind that comes from knowing their vital information cannot fall into the wrong hands.

The A-Key(R) token also supports multiple authentication protocols (One- Time Password, PKI, or Challenge-Response authentication), and all Authenex products leverage the chip-based A-Key(R) token, making them easy to manage and use.

"This is the advance the security sector has been waiting for. It means that users can be totally mobile and productive, while maintaining the integrity of the organization's security," said Mr. Lin.

About Authenex, Inc.
Authenex has developed the most affordable, secure and easy-to-use platform for strong (two-factor) authenticated e-security solutions, making it possible for enterprises and PC-users to afford and deploy the highest standards in network security. The Authenex suite of applications includes Strong Authentication for VPN, LAN and Web, Strong Web Access Control, End Point (File, Folder, and Hard-Drive) Encryption, Secure File Exchange, and Secure Certificate Storage.

For more information, call 1-877-AUTHENEX, or visit http://www.authenex.com/.

Authenex, A-Key, ASAS, HDLock, ASafe, ACert, A-Remote and associated logos are registered or unregistered trademarks of Authenex, Inc. All other registered and unregistered trademarks in this document are the sole property of their respective owners.

All Topics