Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireCase Studies (Physical)

European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions

New Newswire Feature Image 3/8/2012
December 9, 2014

London-based Carphone Warehouse Group PLC is Europe’s leading independent mobile communications retailer. The company operates across 10 markets and employs over 8,000 people in more than 1200 stores and via online outlets throughout Europe. Its UK market share is over 22 percent. The Carphone Warehouse operates in other European markets as The Phone House, including Belgium, France, Germany, Ireland, the Netherlands, Portugal, Spain, Sweden and Switzerland.

Since 1989, the core business has been to provide reliable and innovative mobile communication products and services – accompanied by a commitment to the highest levels of customer support. Consistent with that philosophy, the company seeks to constantly arm its large workforce with productivity tools that give them maximum business mobility and agility, while simultaneously protecting corporate assets by securing dynamic communication and the company’s IT infrastructure. Employees and partners require direct access to leading computing applications, online and retail sales and inventory data, and secure email. HID Global meets those stringent criteria with easy-to-use token authentication that verifies employees and partners are who they say they are for streamlined remote access to network systems and services.

With its leading position among mobile phone and telecom retailers, The Carphone Warehouse is in constant pursuit of solutions that maintain its competitive edge and innovation. The previous “dial-up” remote access system that was in place for many years had proven to be costly to the company due to mounting traditional phone line expenses, and frustrating to users due to limited bandwith for supporting access and transfer of large files. Also, the sheer magnitude and complexity of managing systems for a diverse and distributed workforce to remotely connect to IT systems presents a daunting infrastructure challenge, and led to a desire for a solution that would not require the instal¬lation of client software on user PC’s and laptops across the various corporate offices and 1200 store locations. Acknowledging the unacceptable risk posed by weak and insecure static passwords (username-password) for the enterprise, the company sought a better way of validating the identity of users prior to granting mobile access. In addition, to guard against unauthorized access and malicious activity, The Carphone Warehouse was looking for a digital identity solution that would reduce the administration time for managing thousands of distributed token users, and that would enable the company to know with certainty who is accessing the network from any location, at anytime. Those employees include management teams responsible for driving business at corporate, regional and branch levels as well as IT-focused staff – all of whom are users requiring fast and seamless access to databases, secure email, the Internet, sales applications, company data, and systems.

 The Carphone Warehouse decided to deploy a Virtual Private Network (VPN) in combination with strong token-based authentication of users to meet its remote access needs. They specifically chose a Juniper Networks Secure Socket Layer (SSL) VPN solution with Citrix server-based computing, over a traditional IPSec VPN, as a more secure and more accessible solution for employees and partners. Unlike IPSec VPN’s, the web-based interface of the SSL VPN, coupled with strong security from HID Global, truly enabled employees to connect from any company office, retail store locations, from home, and the growing number of hotspots and web cafes. Remote users logon to the system using HID Global’s Tokens with any PC or computing device through a web browser – and are transparently authenticated at the backend with HID Global’s 4TRESSTM AAA Server for Remote Access software.

After thorough piloting and evaluation, The Carphone Warehouse came to the conclusion that other solutions on the market for strong authentication were less efficient and more costly due to dualadministration requirements. In contrast, with HID Global there is no need for the addition of a separate user database for managing digital identities on top of the existing corporate systems. HID Global’s 4TRESS AAA Server for Remote Access integration with Microsoft® Active Directory® met The Carphone Warehouse’s requirements for centralized management, a single point of administration, and streamlined provisioning of user accounts – and also supported the planned migration from Windows® 2000 to Active Directory. As a major consumer retailer, the company has a large number of external users made up of manufacturers, vendors, and IT product suppliers. The Carphone Warehouse simply adds those third party individuals into Active Directory, based upon a designated role that defines what content and applications they can access. From the user perspective, authentication “On-the-Go” is made possible with HID Global’s Keychain Token that solves the problem of weak static passwords in a portable strong authentication device. HID Global, two-factor authentication validates employee identity via something the user has (the token) and something the use knows (their PIN code) in order to produce a secure one-time-use password. As its dynamic password solution, The Carphone Warehouse chose the compact form -factor that conveniently attaches to the user’s keychain. Unlike other keyfob tokens on the market, the user simply types their PIN into the trusted pin-pad on the device itself – instead of sending the sensitive PIN credential over the network. ActivIdentity offers the advanced security benefits of challenge/response and synchronous authentication with a patented three-variable algorithm: time, event, and secret key.

KEYWORDS: HID Global

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • HID Global Takes a Logical Step in the Convergence of Access Control Solutions;

    See More
  • HID Global Takes a Logical Step in Convergence of Access Control Solutions

    See More
  • HID-video-main

    HID Global Creates an Integrated Mobile Experience and Enhances Security for Skanska

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing