Cypak core technology Combat fraud and keep your customer happy

Slides:



Advertisements
Similar presentations
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Advertisements

XProtect® Web Client 1 Product presentation.
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
Mobile Based Two Factor Authentication For Online Transactions Authentication For Online Transactions.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
DIR-657 HD Media Router 1000 Sales Guide Wireless & Router Product Div. Feb 2011 D-Link WRPD.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Web 2.0: Concepts and Applications 11 The Web Becomes 2.0.
Samuvel Johnson nd MCA B. Contents  Introduction to Real-time systems  Two main types of system  Testing real-time software  Difficulties.
Proprietary and Confidential rev. 3/2012 Topic Module Overview 1 Consumer Experience2 Administrator Set-Up3 System Maintenance4 User Maintenance 5 Reports6.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Identity on Force.com & Benefits of SSO Nick Simha.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Deepnet Unified Authentication for Outlook Anywhere.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Online Parking System.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Skill Area 214 Introduce World wide web(www)
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Step 1 Remove the wifi Network which is already connected.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Identity Standards Architect, Microsoft
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Implementing and Managing Azure Multi-factor Authentication
IT Security Awareness Day October 19, 2016
Mark Ryan Professor of Computer Security 25 November 2009
TOPIC: HTTPS (Security protocol)
Where the security and convenience meet
Web Portal Project.
Security Fundamentals
Product Manager, Keon PKI
BY GAWARE S.R. DEPT.OF COMP.SCI
Yahoo Support Ireland Toll-Free Number:
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Encryption The Good kind of obscurity
Password: (Case sensitive) – #Basic123
Who Uses Encryption? Module 7 Section 3.
Office 365 Identity Management
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Digital $$ Quiz Test your knowledge.
Operating Systems Security
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Connecting Remotely Winter 2014.
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
What is Four51?.
Overview The World Wide Web has changed the way that people
Overview The World Wide Web has changed the way that people
How to keep the bad guys out and your data safe
IBM Software New life for legacy card processing system IBM CICS Transaction Server improves time-to-market for new solutions and services The need: A.
Week 7 - Wednesday CS363.
Getting Started With LastPass Enterprise
Presentation transcript:

Cypak core technology Combat fraud and keep your customer happy A new, cool and convenient way to identify your customers. For the eWallet, eBanking and eBrokerage industry.

The growing Internet fraud Phishing - User is cheated to reveal username / password to aliens Pharming / false website - User is cheated to reveal sensitive information on false web-site Key-loggers - Alien code or hardware intercepting keystrokes Trojans - Alien code eavesdropping sensitive information Non-repudiation – User denies performed transaction

Hard facts on security Static identities with username and password is not secure - Trivial to intercept and replay. Two-factor authentication needed to provide security - Something to have and to know - Access to service not possible without a device - The user knows if the identity/device has been stolen Secure authentication devices (used for eBanking, corporate login, etc) are often regarded as: - Awkward - Time consuming - Costly

Combining security with convenience Cypak eSecurity - Two-factor authentication devices combining security, simplicity and branding Keys Cards

System components The end-user Key or card + reader connected to the USB port The merchant Authentication Software running on server No client software required ! Works on all platforms !

How it works – the Key 1. Key in USB port connects automatically to your site 2. User enter username/password and press button on key 3. Username/pw and a one-time password is sent to the server

Key and Card with PIN-keypad PIN entered on Key/Card keypad for additional security Navigation to multiple sites and services

Security and system benefits Insensitive to Phishing, Pharming, Key-loggers, Trojans - A new and unique access code is generated every time Fights issues of non-repudiation - Strong two-factor authentication ties user to performed action Unbeatable simplicity - Automatic navigation to specific website - Works in parallel with username/password – no extra step - Minimal redesign of existing website - No client software required at all - Works on all platforms (Windows, Mac, Linux, etc.) - Works on all browsers (Explorer, Safari, Firefox, etc)

The marketing opportunity Increased trust - For the service provider and the user Brand reinforcement - Corporate profile on Card or Key, exposed in physical wallet or keychain - Customized shapes and colours available for keys and Card readers Enhanced credit limits - Stronger authentication enables higher credit limits Card can be combined with withdrawal functionally

For more information www.cypak.com/esecurity or e-mail: esecurity@cypak.com