Financial Institutions Identity Based Security

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Oracle IDM at First National Bank
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Challenges of Identity Fraud Chris Voice, VP Technology.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Travillon Consultants
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
E-Learning, Human Capital Management and the Banking Sector Dimitris Baltas, ATC ROM.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
“Stronger” Web Authentication: A Security Review Cory Scott.
The Changing World of Endpoint Protection
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
FFIEC Cyber Security Assessment Tool
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
© DataCard Corporation. All rights reserved. TRENDS IN eGOVERNMENT Drivers, applications and technologies.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
One Picture 4 Points No Passwords
EMV.
Implementing and Managing Azure Multi-factor Authentication
Mastercard Identity Check Mobile
The time to address enterprise mobility is now
Deployment Planning Services
BLOCKCHAIN APPLICATION IN CORE BANKING
(Secure) Digital Banking
Do you know who your employees are sharing their credentials with
Journey to Microsoft Secure Cloud
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
Real-time protection for web sites and web apps against ATTACKS
Authentication 2.0: User Generated Security
Primal and Microsoft Azure Deliver Personalized Content, Intelligence, and Analytics That Match Your Content to the Interests of Your Audience MICROSOFT.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
EMV® 3-D Secure - High Level Overview
Mr. Roeshink – Financial Operations
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Secure & Unified Identity
Virtual Private Network (VPN) Market
Company Overview & Strategy
Securing Your Digital Transformation
Office 365 Identity Management
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
The Evolution of Money and Biometrics
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
TruRating: Mass Point-of-Payment Customer Rating System Uses the Power of Microsoft Azure to Store and Analyze Millions of Ratings for Business Owners.
Public Key Infrastructure from the Most Trusted Name in e-Security
Securing the Threats of Tomorrow, Today.
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Leveraging on EMV cards for One-Time-Password authentication
Presentation transcript:

Financial Institutions Identity Based Security Sam Linford Territory Manager

Who is Entrust? Market Leader In Secure Identities & Transactions One software platform to create, manage and leverage identities Across mobile, cloud, physical and logical environments Delivered via cloud and on-premise software options Known for Innovation Leader in authentication, certificate management, encryption and PKI technology Pioneered new capabilities in cloud, mobile and eGovernment More than 100 patents granted or pending Proven Market Penetration & Customer Reliance 5,000 customers in 85 countries, with more than 500 million secure identities Diversified customer base including financial institutions, governments and enterprises Globally, more than half of all ePassports utilize Entrust © Entrust, Inc. All rights reserved. 9/21/2018

Entrust, Part of Datacard Group © Entrust, Inc. All rights reserved. 9/21/2018

With a customer retention rate more than 95%, we like to say we are known by the customers we keep. Who is Entrust? Market Leader In Identity-Based Security One software platform to create, manage, and leverage identities Across mobile, cloud, physical, and logical environments Delivered via cloud and on-premise software options Known for Innovation Leader in authentication, certificate management, encryption, and public key infrastructure technology Pioneered new capabilities in Cloud, Mobile, and eGovernment Over 100 patents granted or pending Proven Market Penetration & Customer Reliance 5,000 customers in 85 countries, with over 500 million secure identities Diversified customer base including financial institutions, governments, and enterprises Globally, over half of all ePassports utilize Entrust 95% average customer renewal rate © Entrust, Inc. All rights reserved. 9/21/2018

© Entrust, Inc. All rights reserved. 9/21/2018

The Problem Evolving Sophistication of the Threat Landscape Distributed Denial of Service (DDoS) Man-in-the-Middle SMS Bypass State-Sponsored Attacks Organized Crime Hacktivists DNS Poisoning Man-in-the-Browser Advanced Persistent Threats (APTs) Spear-Phishing © Entrust, Inc. All rights reserved. 9/21/2018

Today’s Threats are Focused on Stealing or Compromising Identities MITB / MITM / DDoS Integrity attack – appear as the real identity ZITMO / MITMO Compromise mobile SMS, photos, & contacts HTML Injection Identity stolen through injected fields Key Logging Identity and actions compromised Session-Riding / Token-Stealing Identity integrity is compromised DNS Poisoning URL identity is compromised DIGITAL IDENTITY © Entrust, Inc. All rights reserved. 9/21/2018

The Problem Malware Variants: An Arms Race In Millions Millions of Malicious Programs Add in millions somewhere Source: AV_TEST GmbH © Entrust, Inc. All rights reserved. 9/21/2018

© Entrust, Inc. All rights reserved. 9/21/2018

Regulatory Demands BSA / AML / KYC PCI FFIEC – Authentication in an Internet Banking Environment 2005, 2011 BSA / AML / KYC Bank Secrecy Act, Anti-Money Laundering, Know Your Customer – requires banks to record and report on high value transactions to assist governments catch criminals via money laundering trails PCI – payement card industry dictates the need to encypt credit / debit card holder information FFIEC – online banking secuirty “Reg E protection for commercial accounts :I discussed this topic with Aite (FI analyst firm we work with) and they indicated there is groundswell growing and several US Senators are proposing that “Regulation E” type protection (whereby banks are held responsible for fraud losses on consumer bank accounts today)  should be extended to wholesale / commercial banking as well. Aite felt if a democratic congress were in power, it could drive this stronger regulatory burden. © Entrust, Inc. All rights reserved.

PCI © Entrust, Inc. All rights reserved. 9/21/2018

Diverse Demands Across The Enterprise Identities across multiple Line Of Business Retail, Wholesale, High net worth, Investment Channels / services Traditional: Web, ATM, Voice, Mobile: introduces new security challenges P2P payments, RDC, EMV Securing internal identities Employee identities Websites, applications, servers, ATM’s / kiosks Mergers, acquisitions, geographic expansion LOB=line of business ATM – automated Teller Machine IVR- interactive voice response P2P- person to person - RDC- remote deposit capture – take a picture of a check on your phone and deposit it on mobile banking EMV-Europay MasterCard VISA – chip technology in payment cards Data point for need to secure internal identities: In September 2012, the FBI, FS-ISAC and IC3 issued a fraud alert related to “Cyber Criminals Targetting Financail Institution Employee Credentials to Conduct Wire Transfer Fraud Constant challenge to meet both user experience and security needs © Entrust, Inc. All rights reserved.

Constant And Rapid Pace Of Change Has Led To Authentication Silos Array of authentication approaches Device fingerprinting & IP Geo Knowledge-based authentication OTP based Certificate-based auth. Fraud monitoring Out of band notification & verification Transaction signing Voice biometric authentication Challenges: Highly complex and expensive to manage Point solutions are hard to adapt to new threats Significant effort to build a cohesive cross-channel UX Set the stage that security needs continue to evolve and the traditional approach of point authentication solutions is © Entrust, Inc. All rights reserved.

© Entrust, Inc. All rights reserved. 9/21/2018

What Are We To Do? Protecting Identities Solves The Problem Authenticate & Secure Identities of Servers People Machines Devices Apps

What Are We To Do? Protecting Identities Solves The Problem To Ensure Identities are Authorized to Conduct Transactions Access Networks Cross Borders Enter Facilities Control Infrastructure

Entrust Solutions © Entrust, Inc. All rights reserved. 9/21/2018

How We Solve It Entrust Portfolios 3 Key Portfolios Authentication & Fraud Detection Digital Certificates & PKI Secure Cloud Services © Entrust, Inc. All rights reserved. 9/21/2018

A True Software Authentication Platform © Entrust, Inc. All rights reserved. 9/21/2018

A Software Authentication Platform that Addresses Multiple Domains Flexibility Ease of Use Federation Physical/Logical Mobile APIs & SDKs Self-Service Cloud Authentication Suite Integrations Web Admin OTA © Entrust, Inc. All rights reserved. 9/21/2018

MOBILE a game changer © Entrust Inc. All Rights Reserved. September 21, 2018

What Makes Mobile Secure? Signed / vetted applications (stores) Application sand-boxing architecture on device Ability to block use of persistent / shared memory Security controls can be embedded into applications digital identities that cannot be stolen / guessed, PIN protected apps. Microphones, cameras, GPS can be leveraged Fragmented ecosystem compared to desktop browsers Divers OS platforms; vendor-specific mobile applications Mobile: a challenging attack vector for criminals to make a profit © Entrust, Inc. All rights reserved.

Mobile Transactions Are Growing P2P payments will be a big impetus to grow mobile banking 37% commercial today 71% consumer today Source: Aite Group Source: Aite Group © Entrust Inc. All Rights Reserved. September 21, 2018

Entrust IdentityGuard Take Advantage of the Mobile Evolution Leverage the Device Secure the Device Strong Authentication Desktop Malware Protection Mobile Smart Credentials Transaction-Signing Identities & Transactions Device Certificates MDM Integration Application Protection Analytics © Entrust, Inc. All rights reserved. 9/21/2018

Leveraging Mobile For Malware / MITB Protection ❼ Transaction is completed ❶ Transaction initiated from user Compromised with desktop Malware? ❸ Transaction details retrieved over secure connection ❷ Notification sent “Out of Band” ❻ Signed transaction is sent to IdG for verification User initiatives online transaction Transactions can be: Wire transfers ACH payments Stock trade Change of account information Unlimited # of rows ❹ User reviews transaction on phone/ tablet ❺ Transaction is digitally signed using mobile application (OATH or x.509)

Trusted Advisor Recommendations Risk Mitigation Transaction Signing Desktop Malware Protection Analytics Smart Credential MDM Integration Application Protection Device Certificates Legend Soft Token Authentication Secure Mobile Grid Authentication Leverage Mobile SMS Authentication Business Value

Transactionguard “Front door” access and in session transactional details User behavior profiling AND Web access behavior Blend of rules and statistical learning 27 27

Case Study © Entrust, Inc. All rights reserved. 9/21/2018

Multi-function Multi-Factor Multi-application Cross-sector © Entrust, Inc. All rights reserved. 9/21/2018 Cross Jurisdiction

© Entrust, Inc. All rights reserved. 9/21/2018

© Entrust, Inc. All rights reserved. 9/21/2018

© Entrust, Inc. All rights reserved. 9/21/2018

Proud Winner of Two 2014 SC Magazine Awards “Best Multifactor Solution” “Best Fraud Prevention Solution”

With a customer retention rate more than 95%, we like to say we are known by the customers we keep. Who is Entrust? Market Leader In Identity-Based Security One software platform to create, manage, and leverage identities Across mobile, cloud, physical, and logical environments Delivered via cloud and on-premise software options Known for Innovation Leader in authentication, certificate management, encryption, and public key infrastructure technology Pioneered new capabilities in Cloud, Mobile, and eGovernment Over 100 patents granted or pending Proven Market Penetration & Customer Reliance 5,000 customers in 85 countries, with over 500 million secure identities Diversified customer base including financial institutions, governments, and enterprises Globally, over half of all ePassports utilize Entrust 95% average customer renewal rate © Entrust, Inc. All rights reserved. 9/21/2018

IDENTITY EVOLVED © Entrust, Inc. All rights reserved. 9/21/2018