For Immediate Release
Independence, MO – April 30, 2012 – GoldKey Security Corporation announced today that GoldKey USB Security Tokens have passed the FBI vetting process to provide Advanced Authentication as part of the CJIS Security Policy compliance strategy for the City of Marysville, WA, Police Department.
The recent Criminal Justice Information Services (CJIS) Security Policy has mandated the use of Advanced Authentication for all law enforcement personnel accessing CJIS, a computerized information system that is part of the FBI’s National Crime Information Center. CJIS is utilized by state, local, and federal law enforcement and criminal justice agencies to access critical personal information such as fingerprint records, criminal histories, and offender registrations.
While law enforcement professionals realize the need to keep this sensitive information safe, the policy is placing additional burdens on IT departments as they rush to comply with the new regulations. The FBI policy requires state and local agencies to comply with the Advanced Authentication requirements by September 2013.
GoldKey Security Tokens are being used to meet the FBI’s CJIS Security Policy requirements for Advanced Authentication by requiring two-factor user authentication, something they have (GoldKey USB Security Token) and something they know (the user’s PIN). This provides a far more robust security model than password-only authentication.
“GoldKey has long been used by enterprises and federal government agencies,” said Jon Thomas, VP of Sales at GoldKey Security Corporation. “It is very gratifying to have this independent verification from such a prestigious organization. We hope this will encourage local agencies to join the many organizations that have added GoldKey to their data security strategies.”
City of Marysville, WA Police Department
The City of Marysville, WA Police Department utilizes some of the latest mobile technologies available to law enforcement. Each squad car is outfitted with a laptop that has access to CJIS through their dispatch center called “SnoPac.” Strict FBI Security Policies require that access to this sensitive information be protected by “Advanced Authentication” at the Local and State level.
“We have been really pleased with the GoldKey product and their tremendous support,” said Worth Norton, Information Services Manager at City of Marysville, Washington. “We feel that the small size and durability of GoldKey Tokens will help this implementation last a long time in the field.”
GoldKey Security Tokens are designed for seamless integration with Microsoft® Active Directory® to provide two-factor authentication without the need for additional software or middleware. This is an ideal path forward to CJIS compliance for agencies currently using Active Directory for password-only authentication.
GoldKey Tokens utilize the widely-available USB port so there are no card readers to purchase or maintain. They do not require an internal battery for power and feature a rugged, water-tight design – ensuring an extended life in the field. GoldKey represents a solid alternative solution to OTP (One-Time-Password) tokens which require internal batteries for operation and have recently proven vulnerable to security attacks. GoldKey Tokens also offer a more affordable Advanced Authentication solution over biometrics such as fingerprint scanning, which can sometimes be unreliable. GoldKey Tokens are made and supported in the USA.
Learn more: CJIS Advanced Authentication Compliance with GoldKey
About GoldKey Security Corporation
GoldKey Security Corporation is the leading provider of enhanced two-factor authentication that protects sensitive data and resources for government, financial, and other organizations with its hardware and software tokens. Deployed by customers in over 40 countries, GoldKey’s security tokens allow shared access to encrypted files and secure login to online resources. A Midwest USA-based, family-owned company, GoldKey provides an innovative alternative to less secure log-in methods with its patent-pending technology that puts control of access in the hands of its users.