Gatekeeper: hands-free, wireless, and passwordless authentication

B2B Cyber ​​Security ShortNews

Share post

Increased security requirements in industrial companies in the context of data traffic are therefore absolutely necessary in order to ward off cyber attacks from outside and thus to maintain production. Secure authentication and user-friendly for every access control, ProSoft presents the GateKeeper, an intelligent and wireless login management using proximity authentication.

On the one hand, the “factory of the future” stands for effective just-in-time production as well as intelligent and self-regulating systems. On the other hand, it also stands for increased data volume and communication between people and machines, as well as between machines. Increased security requirements in industrial companies in the context of data traffic are therefore absolutely necessary in order to ward off cyber attacks from outside and thus to maintain production. These increased safety measures must also be applied to every employee in the factory. The key word for all users of the production-internal systems is: Secure authentication for every access control. In order to make this time-efficient and user-friendly at the same time, ProSoft presents the GateKeeper, an intelligent and wireless login management using proximity authentication.

For industry: Bluetooth halberd tokens

"The GateKeeper extends and improves both the static authentication, which is only carried out by entering a name and password, and the multi-factor authentication, which is secured by passcodes that are only valid once," says Robert Korherr, Managing Director of ProSoft GmbH.

Halberd tokens provide more security than complex passwords

As part of the GateKeeper solution, each user receives a Bluetooth Halberd token (Halberd, in German: halberd) as a wireless key. This first step in terms of secure authentication has the following advantage: Weak, stolen or compromised credentials are one of the greatest IT security risks. And even complex passwords are often powerless against modern cyberattacks. Hardware tokens, on the other hand, are immune to such external attacks due to their zero-touch properties and are therefore an important part of secure authentication.

In industrial production, two scenarios are possible depending on the individual security requirements: In the standard application, the plant operator approaches his machine with his token. This is recognized by the USB proximity sensors (Bluetooth receiver) installed on the terminal and automatically registered. If he leaves the location again, the control terminal is automatically blocked.

If higher security requirements apply, a PIN entry or the confirmation of biometric features via a fingerprint sensor is also possible in addition to approximation - the so-called two-factor authentication.

More at ProSoft.com

 


About ProSoft

ProSoft was founded in 1989 as a provider of complex software solutions in the large computer environment. Since 1994 the company has focused on network management and IT security solutions for modern, heterogeneous Microsoft Windows infrastructures, including Mac OS, Linux as well as mobile environments and end devices. The experts manage efficient software and hardware for corporations and medium-sized companies and have established themselves as specialists for IT security. In addition, as a value-added distributor (VAD), ProSoft supports manufacturers with the “go-to-market” and the launch of new solutions in the German-speaking part of Europe.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more