PGP Corp. co-founder's startup targets cloud authentication

By , Network World |  Security, authentication, cloud security

When Phil Dunkelberger co-founded PGP Corp. in 2002 with Jon Callas, it was to acquire the codebase for the famous encryption technology known as "Pretty Good Privacy" which had been sold to Networks Associates in 1997. That proved a good move for public-key encryption, and now Dunkelberger says his next project -- the formation of a company called Nok Nok Labs -- involves a revolutionary way to support authentication in corporate networks and the cloud.

Although Network Associates (later named McAfee) hadn't managed to do much with the PGP public-key encryption technology, Phil Dunkelberger, then president and CEO of PGP Corp., had confidence that the corporate need for public-key email and file encryption was going to grow.

Does two-factor authentication need to be fixed?

That idea paid off, and with a growing roster of global companies using commercial PGP encryption, PGP Corp., which had acquired the technology for less than $2 million, sold it to Symantec two years ago for more than $300 million. Dunkelberger says Nok Nok could have an even bigger impact on security because this time he's out to pave the way to radically improve how authentication for both corporate networks and cloud-based services is done.

"PGP was starting to do what our vision was, managing devices," says Dunkelberger about his tenure as president and CEO at PGP Corp., based in Menlo Park, Calif., and bought by Symantec, which continues to expand the products line.

Dunkelberger contends it's time to basically alter how authentication is done because it's an inflexible array of processes that doesn't meet the demands of cloud computing. The problem today, according to Dunkelberger, is that the range of technologies out there, such as soft tokens, hard tokens, Trusted Platform Module (TPM), biometrics, simple passwords and more have led to something of a "Tower of Babel" for authentication. Nothing talks to anything else and applications lack flexibility to adapt to a variety of authentication platforms on the fly.

"The current options fail to address the need. Is it easy to use? Under all circumstance? Do I have to rip and replace?" Dunkelberger says.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question