WTG New Technology Corp Passfaces Corp About the companies WTG New Technology Corporation (NewTech) is a technology transfer company specializing in the.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Implementing Tableau Server in an Enterprise Environment
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Chapter 17: WEB COMPONENTS
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Outline IS400: Development of Business Applications on the Internet Fall 2004 Instructor: Dr. Boris Jukic Server Side Web Technologies: Part 2.
Graphical Passwords with Integrated Trustworthy Interface TIPPI Workshop June 19, 2006 Patricia Lareau V P Product Management.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Computer Science 101 Web Access to Databases Overview of Web Access to Databases.
© InLoox ® InLoox PM Web App product presentation The Online Project Software.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Cloud computing Tahani aljehani.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Overview of JSP Technology. The need of JSP With servlets, it is easy to – Read form data – Read HTTP request headers – Set HTTP status codes and response.
Automating 100 Processes with Interneer Apps Chris Condon – Director, IT Innovation and Solutions, Los Angeles Firemen’s Credit Union.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
Week 7 Lecture Web Database Development Samuel Conn, Asst. Professor
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
NODEJS, THE JOOMLA FRAMEWORK, AND THE FUTURE IAN MACLENNAN.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
|Tecnologie Web L-A Anno Accademico Laboratorio di Tecnologie Web Introduzione ad Eclipse e Tomcat
Name Company A Day in the Life… A Demonstration of Application Delivery.
Implementation - Part 2 CPS 181s March 18, Pieces of the Site-building Puzzle Page 180, figure 4.1.
Putting it all together Dynamic Data Base Access Norman White Stern School of Business.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Project 2003 Presentation Ben Howard 15 th July 2003.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 7: Marketing Tools Intuit Financial Services University Internet Banking Certification Training.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Microsoft Management Seminar Series SMS 2003 Change Management.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
WEB SERVER SOFTWARE FEATURE SETS
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Glink for Java: applet, application and an API for integrating access to Bull, IBM, UNIX and Minitel systems with your Java based e-business applications.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Education Portal Solutions for Higher Education Education portals create a common gateway to the data and services that the people throughout your university.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Setting and Upload Products
Recipes for Use With Thin Clients
Netscape Application Server
World Wide Web policy.
IBM Start Now Host Integration Solutions
First-time Login to Business Banking:
Setting up an online account
InLoox PM Web App product presentation
Goals Introduce the Windows Server 2003 family of operating systems
Sherpany’s Boardroom App for Windows: It’s a Perfect Tool for Managing Top-Level Meetings, Optimized for Use on Microsoft Surface Devices WINDOWS APP BUILDER.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
Designing IIS Security (IIS – Internet Information Service)
Securing web applications Externally
Presentation transcript:

WTG New Technology Corp Passfaces Corp About the companies WTG New Technology Corporation (NewTech) is a technology transfer company specializing in the Washington DC market. Passfaces Corporation is a security technology company, featuring Passfaces, a bi-directional, two factor, cognometric authentication system based on a patented technology that leverages peoples innate ability to recognize faces. The Companies To provide the online world with a secure, usable and affordable strong authentication solution and a practical alternative to tokens and biometrics. The Mission

WTG New Technology Corp Passfaces Corp Royal Credit Union More About Passfaces Passfaces: Strong / Two Factor Authentication and Phishing Protection Used primarily in Banking and Healthcare Also used – without problem – for 8 years by a major branch of the US Government Core technology is cognometrics, the human brains innate ability to recognize familiar faces CU Service Provider Patents granted world-wide Deployed without hitch to users at a major credit union in 2008 Selected by major healthcare provider with users in 2009 Customers include:

WTG New Technology Corp Passfaces Corp Why Strong Authentication ? Strong authentication is an essential enabler for the provision of online services It is needed for: Transaction & Data Protection E.g. Online banking, Personal Health Records Compliance E.g. FFIEC, HIPAA User Reassurance / Trust Insecure users wont use online services And because Passwords: can be guessed or cracked are written down And people use the same one everywhere Users forget them (and call the help desk) And, most critically today, they can be phished! Passwords are the weakest of weakest links – Bill Gates

WTG New Technology Corp Passfaces Corp Why Passfaces ? Passfaces provides strong authentication – and phishing protection – without pain! Easy to deploy Leverages existing password infrastructure No user hardware or software – works in browser No new servers or databases Easy for users No device to lose or forget No personal questions/answers to remember Machine & location independent – i.e. fully portable Built-in anti phishing does not require user attention Easy for administrators [Almost] no resets Actually liked by users Easy on budgets Less than one tenth the cost of tokens Save on purchase, implementation and support

WTG New Technology Corp Passfaces Corp Passfaces is Different Graphics and images are among the simplest and most effective means to communicate and interact with people But, like a password, you still need to recall a graphic or image Faces are Different The brain uses a dedicated, intuitive process to learn and remember faces The brain recognizes, not recalls, faces Face recognition is a universal skill – independent of age, language or education Source: Face Recognition: A Literature Survey. National Institute of Standards and Technology Passfaces is a graphical authentication system

WTG New Technology Corp Passfaces Corp Passfaces Strong Authentication Passfaces provide a simple, but powerful, means of overcoming the vulnerabilities of passwords Passfaces are used with a password to provide two factor or strong authentication For two-factor authentication, users are typically assigned 3 secret passfaces in addition to their password Here are your Passfaces

WTG New Technology Corp Passfaces Corp Passfaces Strong Authentication To log on, users pick out one of their Passfaces from a challenge grid of 9 faces Each challenge grid contains 1 Passface and 8 decoy faces The process is repeated for each of the users Passfaces Click On Your Passface

WTG New Technology Corp Passfaces Corp A CREDIT UNION DEMONSTRATION For your convenience, we would like to show you a brief demonstration of a credit union's use of Passfaces for their online membersdemonstration

WTG New Technology Corp Passfaces Corp 1.Security – better than passwords alone 2.Usability – no complex pass codes or procedures 3.Non-Intrusive – users are averse to change and reluctant to do more 4.Visibility – users want to see that companies are increasing security 5.Mobility – users log on using different PCs in different locations 6.Consistency – of user experience 7.Reliability – no false rejection, no system errors, no user errors 8.Bidirectional – verify the User to the Site AND the Site to the User 9.Flexibility – for varying risk levels and customer choice 10.Easy Integration – with current systems and procedures 11.Low Cost – Procurement, deployment and ongoing maintenance Source: Gartner Inc. Strong Authentication Requirements Usability is key – especially for consumers. If they cant or wont use the security system, then it wont work!

WTG New Technology Corp Passfaces Corp What Are the Alternatives? Biometrics Smart Cards Tokens Crypto Cookie Code Cards Keypad Scrambler

WTG New Technology Corp Passfaces Corp Strong Authentication Alternatives Passfaces Virtual Keypad Biometrics Risk Analysis Code Cards Crypto Cookies Smart Cards Tokens Personal Pictures Security Bidirectional Intrusiveness Visibility Usability Mobility Management Integration Rollout Cost Click On Your Passface Good OK Bad Passfaces is unique in meeting all the requirements for strong authentication

WTG New Technology Corp Passfaces Corp Integrates Passfaces with any Internet platform Includes Server-side code Passfaces Web Clients Administration Console Reference Implementations Detailed integration information Passfaces Image Library Passfaces For NFCU

WTG New Technology Corp Passfaces Corp Existing User Database ODBC or LDAP connector or JDBC/JNDI Interface Web Server Passfaces Web Access End User Client Java Script, ActiveX, or Java No Software or Installation Required Application Server Windows, Java, or SDK Face Library Passfaces Admin Existing Web Application Integrated with

WTG New Technology Corp Passfaces Corp Passfaces Web Access Separate Passfaces Server (JavaScript, ActiveX or Java) No installation! Web Users Passfaces Web Client Web Server/Outlook Web AccessInternet Existing Application Server Passfaces Server (Windows IIS or Java) SSL SQL Database or LDAP Directory Server AD or SQL Database or LDAP Directory Server Administrator Passfaces Admin Console

WTG New Technology Corp Passfaces Corp SSL Passfaces Web Access – Architecture for SSL VPN Connectivity Corporate Network Passfaces Admin Console Web Users Passfaces Web Client Passfaces Server (Windows IIS or Java) DMZ Login information and control Corporate Resources SSL/VPN AD or SQL Database or LDAP Directory Server

WTG New Technology Corp Passfaces Corp SSL Passfaces Web Access – Architecture for Citrix Connectivity Corporate Network Passfaces Admin Console Web Users Passfaces Web Client Passfaces Server (Windows IIS or Java) DMZ Login information and control Corporate Resources Citrix Server AD or SQL Database or LDAP Directory Server

WTG New Technology Corp Passfaces Corp Everything Needed to Add Passfaces Administration Console Web Based (Java application servers) Windows (Microsoft IIS) Server-side code Java class package Java servlet (HTTP interface) ISAPI extension DLL for Microsoft IIS Passfaces Web Clients JavaScript / Java applet / ActiveX Reference Implementations Sample JSP/ASP/HTML pages Detailed integration information Passfaces Image Library Standard or Custom

WTG New Technology Corp Passfaces Corp Customizable User Interface Add Your Logo Change Background Colors

WTG New Technology Corp Passfaces Corp Integrated, Editable User Help Manual User Authentication Thornberry is adding Passfaces, an enhanced logon procedure, to our online services. The new process places an additional security lock to existing Online IDs and passwords. We are taking this step to provide the best protection possible for your online account information. Users are required to enable Passfaces over the next thirty days. You will be prompted to enable Passfaces each time you login. We recommend you enhance your login security as soon a s possible. The process takes from 3 to 5 minutes. We also recommend you View the Demo before starting the process. Thornberry Authentication Link to Passfaces Help Modify Files to Create a Custom Help Manual Add Your Logo Easily edited HTML lets you add sections specific to your Web Access procedures Built In Help

WTG New Technology Corp Passfaces Corp NIST Acknowledgment of Passfaces? From NIST Appendix A2 page 61: A.2 Other Types of Passwords Some password systems require a user to memorize a number of images, such as faces. Users are then typically presented with successive fields of several images (typically 9 at a time), each of which contains one of the memorized images. Each selection represents approximately 3.17 bits of entropy. If such a system used five rounds of memorized images, then the entropy of system would be approximately 16 bits. Since this is randomly selected password the guessing entropy and min-entropy are both the same value. It is possible to combine randomly chosen and user chosen elements into a single composite password. For example a user might be given a short randomly selected value to ensure min-entropy to use in combination with a user chosen password string. The random component might be images or a character string.

WTG New Technology Corp Passfaces Corp Customer Testimonials Passfaces is one of those products that just works… We installed it 7 years ago and have never had a problem with it… I see all these complicated new authentication systems being introduced by the banks and wonder why they dont just use Passfaces. CISO, US Government. We selected Passfaces as it not only raises the bar in terms of security, but it is both easy to use and to implement. David Vandeven, President/CEO Midwest Independent Bank. "ParadigmHealth was an early innovator of website security and authentication. Security and data privacy remain our focus, but now with Passfaces we are also highlighting the importance of increasing ease of use. Passfaces fully addresses the authentication requirements for the large-scale deployment of Personal Health Records." Tom Hagan, ParadigmHealth CIO. Thank you again for your support, your product is already making my life a lot easier and you can quote me on that if you like… Paul Osnes, CIO Easter Seals of Southern California. Passfaces was so unique and we felt our client base would find it very much cutting edge. We wanted something exciting; something different that had security second to none. It excited our folks internally and I knew it would excite our client base as well. Tom Leib, Product Manager RC Olmstead. Buckeye State Credit Union understands its members concerns for secure online banking. We feel that our members financial information is worth the best and most secure layer of authentication we could find. That is why we chose Passfaces. This is much more secure than asking questions like your mothers maiden name or your favorite pets name, or choosing a static picture like a watermelon or a beach scene as your login sign.… Our initial rollout was far more successful than I had ever imagined. My staff and I were prepared and we set realistic expectations that were exceeded. Sometimes the right choice is hard to make but today I am confident that our members information is secure because of Passfaces. Charles Stanfield, Information Systems Director, Buckeye State Credit Union.