Language Selection

English French German Italian Portuguese Spanish

RSA Security Sees Hope in Online Fraud

Filed under
Security

It was a Friday afternoon for the computer encryption folks at RSA Security Inc., and summertime greenery filled the countryside view from Art Coviello's office.

Even so, the RSA chief could have been excused if he didn't seem relaxed. RSA had just announced its second straight set of quarterly results that didn't dazzle Wall Street analysts, and RSA's stock was flirting with a 52-week low.

But Coviello shrugged it off. Analysts, schmanalysts. More importantly, he said, lots of factors are about to turn in RSA's favor, namely the need for more secure, traceable financial transactions in a world beset by online fraud and identity theft.

"The whole thing's moving a lot more slowly than it ought to," Coviello said. "We've got to keep pounding and pounding until we reach a tipping point, and we will take advantage of it."

The lack of an obsession over quarterly results isn't the only unusual thing about RSA, which still bears the marks of an academic past despite being a $300 million company with 1,200 employees and customers in government, banking and health care.

RSA is named for three Massachusetts Institute of Technology professors, Ron Rivest, Adi Shamir and Len Adelman. Though they are no longer involved with the company they founded in 1986, their invention of a seminal method of cryptography set the tone for the company and is crucial in online commerce.

Today RSA is perhaps best known for staging a prestigious annual security conference and for selling 20 million little devices that display a six-digit code computer users must type to gain access to computer networks. The code, which changes every minute as determined by an RSA-created algorithm, is unique to each "SecureID" token, making it useless to a snoop.

The requirement that users enter the code in addition to a password is known as two-factor authentication, an approach that figures to gain ground over simple passwords as more and more sensitive data move online.

Indeed, RSA's sales of authentication products jumped 16 percent last year, as RSA's overall profits more than doubled, to $35 million. E-Trade Financial Corp. and America Online Inc. began offering SecureID devices to some customers over the past year. The Associated Press also uses the tokens for network access.

"It is the Kleenex or Q-Tip of two-factor identification," said Gregg Moskowitz, an analyst with the Susquehanna Financial Group. "SecureID is the brand name."

But wide deployment in consumer applications has come slowly.

In theory, every institution that does business on a Web site could increase its security by offering its users RSA tokens.

But practically, it would be a nightmare to have 20 different devices with their own codes. And banks apparently don't trust one another enough to accept a competitor's authentication token.

RSA hopes to smash such hang-ups by acting as an intermediary, launching a new "hosted" service this fall in which its servers will check whether a consumer entered the proper token code - even if the token was made by an RSA rival - then relay the "yea" or "nay" back to the bank. RSA already provides such a service for companies' internal access control, but has yet to offer it for consumer applications.

Investors will be watching closely. Although Coviello is confident that wider trends in access control - such as rampant identity theft and abuse of Social Security numbers - should play to RSA's strengths, he acknowledges that RSA needs to do more to push the market rather than wait for it.

That means RSA has to be much more than the company known for authentication tokens - a product that some analysts say is coming down in price because of competition. RSA also hopes to expand its sales of software and security consulting services, where heftier rivals such as VeriSign Inc. and International Business Machines Corp. also lurk.

"When you consider all the identity theft that is taking place now, the challenge for RSA is to monetize that," Moskowitz said. "It's easier said than done."

RSA believes one key differentiator can be its research arm, including the eight people in "RSA Labs," a group so focused on the advanced mathematics behind cryptography that it is described as an academic institution within the company.

RSA researchers are expected to dream up ways to expand the use of two-factor authentication, though sometimes that puts the company a bit ahead of the market.

One system being developed would use radio-frequency chips in keyless office access cards so employees wearing one can automatically access their secured computers as soon as they near them. Such a system would use a fingerprint reader on the computer to confirm identity. That product won't be ready, though, for a year or two.

Then there's an effort, led by labs director Burt Kaliski, to give users a better way to confirm the legitimacy of Web sites - and avoid "phishers" who set up phony sites to lure passwords and account information from the unsuspecting.

Kaliski envisions a system in which Web browsers or even computer operating systems act as an intermediary between a user and a site. Through the principles of encryption, the intermediary software could tell the Web site that the user entered the proper password without sending the actual password.

In another realm, RSA has created a "blocker tag" that ensures that radio-frequency identification chips can be scanned only by designated readers. It could be an elegant answer to the question of whether RFID chips, which are designed to streamline corporate inventory systems, might pose privacy risks for consumers. (The chips also are coming to U.S. passports, raising fears that American travelers overseas could be surreptitiously, remotely tracked.)

But for now this and other RFID solutions sit on the shelf, since the deployment of such tags has been slower than predicted.

"That is the hardest thing for a technology company to do," Coviello said. "You have to anticipate a market, not get too far ahead of customers, but you want to be there when they come around."

But he quickly added: "We've been around 20 years, and I think the market opportunity ahead of us is richer than ever before."

By BRIAN BERGSTEIN
Associated Press

More in Tux Machines

Education and Open Access

  • Open access and Brexit
    The UK research community’s response to the recent referendum – in which a majority of 52% voted for the UK to leave the European Union (or “Brexit”) – has been one of horror and disbelief. This is no surprise, not least because Brexit would have a serious impact on research funding in the UK. Nature reports that UK universities currently get around 16% of their research funding from the EU, and that the UK currently hosts more EU-funded holders of ERC grants than any other member state. Elsewhere, Digital Science has estimated that the UK could lose £1 billion in science funding if the UK government does not make up the shortfall in EU-linked research funds.
  • Another View: Nonprofit groups offer lesson in cutting college textbook costs
    Using online, open-source materials instead of expensive printed books eases the burden on students. By The Washington Post. Share. facebook · tweet · email. print Comment.
  • Lanier Tech joins group helping community college students succeed
  • Another View: Colleges should go open source to cut textbook costs
    The following editorial appeared in The Washington Post: Every year, college students shell out thousands of dollars for tuition. Then they face an additional cost: textbooks.

Makulu's LinDoz Is a Smooth Windows-Cinnamon Blend

That technical issue aside, The MakuluLinux line is one of my favorites. Unlike typical distros, Makulu strays from some of the mainstream primary applications. It also has a set of the most commonly used software preinstalled regardless of the desktop flavor selected. For example, it uses the WPS office suite. If you fancy the Cinnamon desktop, you will feel right at home with MakuluLinux. If you cut your computing teeth on Microsoft Windows, you will be particularly enamored with the LinDoz Edition. Read more

Latest From Red Hat Summit

Hands on with KaOS Linux: Not just another derivative distro

For an application first demonstrated a year ago, GigJam still feels tantalizingly unfinished, with a limited number of services you can connect to, frustrating bugs when connecting to Microsoft's own services, no way to work offline and an interface you're unlikely to figure out without reading the documentation (and even then may find frustrating). It's also a fascinating glimpse into what the Microsoft Graph can unlock. The ability to filter your CRM leads information based on your meetings, or your email based on your unfulfilled orders, or your tasks based on the emails about what you're supposed to be doing -- and share that view with your colleagues -- could make you hugely productive. The ability to see the PowerPoint and the Word document you're going to use in a meeting, along with the emails everyone has had from the people you're meeting with so you know what they care about, could be a great way to prepare for the meeting. And you can do all that without sharing more information than you want (probably). It's a fantastic idea, but Microsoft really needs to improve the execution. Read more