Right Networks teams with PhoneFactor to authenticate customer access to cloud applications and data

June 4, 2011

June 2, 2011 – PhoneFactor, a global provider of phone-based authentication, today announces a partnership with Right Networks to provide an additional layer of strong authentication to secure Right Network’s portfolio of cloud applications. Right Networks delivers leading business applications in the cloud for customers ranging from Fortune 100 companies and large not-for-profit organizations to sole proprietorships and individuals.

Right Networks customers will now have the option to enhance the protected access to their applications and data with simple, phone-based multi-factor authentication. “The process is absolutely seamless to our users – there’s nothing for users to install, no tokens or other devices to carry, and no changes to the login interface – it couldn’t be any easier,” says John Farrer, Chief Information Officer at Right Networks.

A user logs in just as he normally would by entering a username and password. Instantly, the user’s phone rings, he answers and presses #, and is immediately granted access. Conversely, if an attacker attempts to log in, the user can block access by answering the phone and pressing 911#. This instantly alerts Right Networks’ that an unauthorized access has been attempted so appropriate countermeasures can be taken.

“Blocking fraudulent access to customer data with out-of-band multi-factor authentication is critical for cloud-based services like Right Networks,” comments Farrer. “Not only is it a best practice, many of our customers have rigorous compliance mandates they must meet. We want to do everything that we can to make this process simple and convenient for them, while also providing the best multi-factor protection available to fight today’s increasingly sophisticated threats.”

PhoneFactor’s co-founder and Chief Technology Officer Steve Dispensa agrees. “Right Networks is taking an important step in protecting its customers,” notes Steve Dispensa. “Cloud-based services offer a number of distinct advantages to businesses, but it is essential that adequate security measures be employed to protect applications and data that reside in the cloud. Enterprises require even more stringent security when it comes to the cloud, including multi-factor authentication.”

Sponsored Recommendations

The Race to Replace POTS Lines: Keeping Your People and Facilities Safe

Don't wait until it's too late—join our webinar to learn how healthcare organizations are racing to replace obsolete POTS lines, ensuring compliance, reducing liability, and maintaining...

Transform Care Team Operations & Enhance Patient Care

Discover how to overcome key challenges and enhance patient care in our upcoming webinar on September 26. Learn how innovative technologies and strategies can transform care team...

Prior Authorization in Healthcare: Why Now?

Prepare your organization for the CMS 2027 mandate on prior authorization via API. Join our webinar to explore investment insights, real-time data exchange, and the benefits of...

Securing Remote Radiology with the Zero Trust Exchange

Discover how the Zero Trust Exchange is transforming remote radiology security. This video delves into innovative solutions that protect sensitive patient data, ensuring robust...