Apr 29, 2024 | Updated: 11:35 AM EDT

Google Acquires SlickLogin

Mar 13, 2014 10:33 AM EDT

Google recently acquired SlickLogin. SlickLogin is an Israeli Internet Security Start-Up. The recent deal indicates Google’s vested interested in security which may show the enterprise company’s interest in passwords as the future. SlickLogin provides sound-based password technology, which requires a smartphone.

“Today we`re announcing that the SlickLogin team is joining Google, a company that shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way,” the SlickLogin team wrote on its website. “Google was the first company to offer 2-step verification to everyone, for free – and they’re working on some great ideas that will make the Internet safer for everyone. We couldn`t be more excited to join their efforts.”

To reduce security risk noticing challenges which may arise in reaching users and driving innovation is important. Organizations have to find out the best ways to minimize security risks while at the same time leverage their technologies to benefit the company. With the right security tools better privacy can be offered for Android. Tools should drive overall focus on the security outcome. Having more standardized tools that leverage both privacy and security risks advances best.

Android can support password policies for its devices and delete them remotely if security risks may be compromised.  It is important for the enterprise to make sure mobile security adheres to security programs. Android users can create and govern the right IT guidelines for its employees. Other areas to consider protecting are limiting sensitive mobile data being transferred, leveraging MDM software for password encryption, monitoring mobile devices, performing security assessments for Android and assessing priority threats across the infrastructure.

Data security and breaches are a known fact amongst all types of organizations to date. The majority of these attacks can be prevented by implementing basic security measures. There has to be faster adoption to learning how to deal with these issues and more aggressively.

The popularity of Android smartphones unfortunately makes it “hacker friendly.” With the right knowledge, users can stay ahead to avoid threats, data loss, infection and risks. Adhering to practical policies can eliminate current and future security threats and reduce risk.

 
Real Time Analytics