SAN FRANCISCO, CA and PALO ALTO, CA — (Marketwire) — 02/21/12 — ARX, Inc., a global provider of cost-efficient digital signature solutions, and Yubico, the leading provider of simple, open online identity protection, extended ARX CoSign® to support YubiKey authentication tokens, making it easy to protect digital signature functionality with secure and easy-to-use, two-factor authentication.Adding digital signature function to Yubico-s authentication device enhances cloud security. By pa
PALO ALTO, CA — (Marketwire) — 01/18/12 — AGARI, selected by BITS, the technology policy division of The Financial Services Roundtable, and the Financial Services Information Sharing and Analysis Center (FS-ISAC), will support the , a new service that equips a financial institution to counter-attack email fraud and phishing with enhanced threat intelligence and proactive controls.With AGARI, the Registry enables BITS and FS-ISAC members to enlarge their vision and understanding of how their
EDISON, NJ — (Marketwire) — 12/19/11 — (OTCBB: SFOR) announced today that SystemSpecs, Nigeria-s leading e-Payment Solution Provider, has integrated to Secure Transactions into its Remita e-Payment Solution for its customers.Founded in 1991, SystemSpecs has since emerged as a leading provider of e-Payment, Financial, and Human Capital Software Solutions for the Nigerian and African environment. The Remita solution was introduced to promote end-to-end electronic processing and payment of S
EDISON, NJ — (Marketwire) — 10/12/11 — StrikeForce Technologies, Inc. (OTCBB: SFOR) is pleased to announce that GuardedID-s Anti-Keylogging Keystroke Encryption Technology is now supported by Microsoft-s latest IE9 browser update released yesterday. "We are very pleased that consumers and corporations that utilize Microsoft-s IE9 Browser can now protect themselves from malicious keylogging attacks with our anti-keylogging technology," says Mark L. Kay, CEO of StrikeForce.:StrikeFo
Confident Multifactor Authentication(TM) Delivers an Entirely Out-of-Band, Image-Based Authentication Challenge on Mobile Devices to Secure the Second Factor and Protect From Zeus-in-the-Mobile Attacks