Gemalto, the world leader in digital security, has been selected by Red Hat to implement digital security tokens that enable secure remote access for the company’s more than 6 000 employees.
Red Hat is the world’s leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualisation technologies.
Gemalto’s Protiva token integrates easily with Red Hat’s strong authentication technology for employees connecting to the company’s virtual private network (VPN) and security assertion mark-up language (SAML) enabled applications.
Red Hat is at the forefront of open source technology, making it essential that their sensitive information is protected by more secure measures than just a username and password. Utilising the security form-factor Red Hat receives secure remote access, with an extra layer of security.
With the importance Red Hat places on open standard solutions, the interoperability of Gemalto’s solution gives Red Hat the flexibility to easily integrate it into their existing and future IT systems. Implementing multi-factor authentication offers advantages on top of the immediate security benefits to enterprises; it is also a preventative measure that can reduce costs from helpdesk calls related to password resets.
“We needed a security solution that provided the same standards we work to promote, and Gemalto’s product and customer support throughout the deployment enabled our members to easily integrate the token into our multi-factor authentication process without missing a beat,” says Jay Madison, senior director, Information and Services, Red Hat.
“Gemalto and Red Hat share the same mission of innovation as well as the dedication to providing high-performance software products and services, such as future-proof cloud computing solutions,” says Mohammad Ismail, Identity and Access Security Manager for Middle East & Africa at Gemalto.
“The two-factor authentication market is growing rapidly and we are seeing that in more and more enterprises, strong authentication has shifted from being considered a best practice to now being a security policy obligation.”