Challenge 10: User-friendly user authentication

Slides:



Advertisements
Similar presentations
Customer Experience Solutions. Delivered. 1 BANK 2.0 Making Banks Successful in the Era of Engagement Banking.
Advertisements

Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Microsoft A Vision for Health. Consumerism/ Choice A Challenging World Public Health Healthcare spend increasing as % of GDP spend Increasing social cost.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
2014 MindSpace Technologies Positive Minds, Positive People.
1. THE TRANSLATION NETWORK Case Studies 2 THE TRANSLATION NETWORK6 Intel OSTC uses Drupal for localization for the Tizen initiative into 6 languages.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
MOBILE SECURITY MADE EASY. STOCKHOLM SOFTWARE COMPANY.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
Protecting Customer Websites and Web Applications Web Application Security.
MD-EXPERT Designed with doctors for doctors. One solution for multiple platforms
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
DIGITAL ASSET MANAGEMENT FOR NEXTGEN APPS PROVIDER Business Problem In today’s growing and connected world, it has become a necessity for almost everyone.
·
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Catherine Lian Managing Director, Dell Indonesia
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Smartphones in the Clinical Environment 25 September 2015.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
© 2015 IBM Corporation Introducing. © 2015 IBM Corporation 2 SELF-SERVICE Covers a wide spectrum of users Power users Consumers Creators Level of Management.
BIG DATA SOURCE AND EXAMPLES DIRECT QUOTES FROM SOURCE: RAINER, KELLY, PRINCE, BRAD AND WATSON, HUGH, MANAGEMENT INFORMATION SYSTEMS: MOVING BUSINESS FORWARD,
Top Business IT Challenges of 2016
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Six Benefits of Using Smart Boards for Businesses.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
One Picture 4 Points No Passwords
Mobile Application Solution
PrinterOn Mobile Printing Platform
The time to address enterprise mobility is now
Cost Effective Mobile Base Health Monitoring System Under Cloud Environment. To interpret health from their mobiles under cloud environment and creating.
Challenge 7: Clinical Alert Management
Digital Banking Ecosystem - Maximizing the Power of Digital Channels -
Information Technology 2016 Budget Presentation
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Tech Genuine offers interactive and feature-rich ecommerce website solutions which enable clients to market their products and services online. We specialize.
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Process Improvement Process Identification
Five Web Design Tips to make a Health Care Website More Attractive
Microsoft Azure Makes it Possible to Use One Workspace, Anywhere, on Just a Single Device “Microsoft Azure has allowed us to quickly scale our platform.
Mobile Application Solution
Advisory Solution Delivery 24x7x365 Production Support
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Beacon Technology Market to.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Beacon Technology Market to grow at 80% CAGR from 2017 to 2024: Global.
About us Expert Technologies has been delivering software solutions for enterprise and middle market customers across multiple target industries.
Company Overview & Strategy
ECM for Legal & Law.
Collaboration on-the-Go
Internet of Things (IoT)
Industrial Ontologies Group: 10th Anniversary
Understanding IDENTITY Assurance
Endpoint Security and Conditional Access
Azure Cloud Offers Solution that Integrates with Business Data for Quality Management System MINI-CASE STUDY “Our solutions are not islands but need to.
ideas to mobile apps in record time,
RSS 2000 Recording and Streaming Solution
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Identity and Trust Management Platform in DICOM
System Center Marketing
Telecommunications Business challenge
Healthcare Business challenge
Authentication Software with Intelligence
Security.
Computer Services Business challenge
Presentation transcript:

Challenge 10: User-friendly user authentication Challenge owner: Geert Claeys Problem statement Every single day, doctors, nurses and other healthcare professionals log in to multiple systems and data platforms Authentication mechanisms are weak and/or not user-friendly Result Healthcare became the most frequently attacked industry and past financial services and manufacturing. Five of the eight largest healthcare security breaches since the beginning of 2010—those with more than one million records reportedly compromised—took place in 2015 Web application attack is in top5 list of security breaches and increasing

Challenge 10: User-friendly user authentication (cont) Looking for solutions that Deliver user-friendly strong smarter authentication (2-factor authentication) across various applications Leverage context data like: Location of the user User bio-metrics : fingerprint, retina Trusted device of user (e.g. smartwatch, smartphone) Leverage cloud based authentication Platforms 2FA : Google Authenticator, Android Smart Lock (trusted device), Fido Agfa : Orbis Desktop/ME, Enterprise Imaging Mobile/Web, Integrated Care Portal