Lockheed Martin Aligns with Ethentica to Market Information Security Solutions
ORLANDO, FL, 03-JAN-01 -- Lockheed Martin (NYSE: LMT) and Ethentica Inc. today announced an agreement to provide authentication solutions and systems integration to the governmental market. The two companies entered the agreement to address the burgeoning authentication needs of government customers, who require the highest level of security and reliability. They will offer increased digital security through biometric-based solutions enabling customers to authenticate the identity of users. Ethentica products and services include both a desktop and mobile computer fingerprint-based security system and a hosted authentication service that allows users to conduct trusted transactions.
The two companies will jointly pursue global opportunities using Ethentica's authentication products and Lockheed Martin's proven integration capabilities in support of government and commercial customers. Lockheed Martin is the leading federal IT contractor. Its Information Systems unit currently provides IT solutions for customers such as the F.B.I. and the U.S. Department of Housing and Urban Development.
Lockheed Martin's alliance with Ethentica will offer our current governmental customers access to new technology that enhances information security, said Lockheed Martin Information Systems President John Hallal. We will combine our systems skills with Ethentica's competencies to jointly develop new biometric identification technologies and services that will continue to set the world standard.
Ethentica views this agreement with Lockheed Martin as one of the next critical steps in redefining how governments and businesses manage their information in this age of heightened digital security and e-commerce, said Doug Antone, president and chief executive officer, Ethentica. With Lockheed Martin's industry-leading position behind us, Ethentica can become the federal government's premier authentication solution provider.
Trusted transactions, such as accessing a secure network, opening proprietary documents, making online purchases or high-value business transactions, involve the need to know who is executing the transaction. The goal of high security is to match something you have, for example, a key, or a card, with something you know such as a password, or answers to a series of questions unique to you, along with something you are, for example DNA, fingerprint, voiceprint, or handwritten signature. There are inherent difficulties with common ID and passwords alone as the mechanism for determining who you are. Biometrics, such as fingerprints, add an element that makes it extremely difficult to compromise your identity either by accident or intent.