Stephen Crick Business Development Manager Tokenless™ Authentication.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

Secure Single Sign-On Across Security Domains
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
McAfee One Time Password
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Secure Lync mobile Authentication
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
Active Directory: Final Solution to Enterprise System Integration
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
S ECURITY M ADE S IMPLE Technology leader in modern two-factor authentication via SMS Morten Skovsgaard Sales Manager
RSA SecurID November 10, 2005.
1 Password Reset Effortless, Self service User Password Reset.
Designed By: Technical Training Department
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
The Office of Information Technology Two-Factor Authentication.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Avaya Contact Center Control Manager. © 2010 Avaya Inc. All rights reserved. What if you could… 1 Requires purchase of additional connectors  Enable.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Proprietary and Confidential rev. 3/2012 Topic Module Overview 1 Consumer Experience2 Administrator Set-Up3 System Maintenance4 User Maintenance 5 Reports6.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 2: Consumer Experience Intuit Financial Services University Internet Banking Certification Training.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
IPSOS / Vodafone / Novartis Kenya 17 December 2014.
Secure Lync mobile Authentication V5V5.
1 Mezzanine Ware (Pty) Ltd © 2014 Installing\Uninstalling the Mezzanine Helium Android application.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Identity Management and Enterprise Single Sign-On (ESSO)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Call-Center Agents, Customers Communicate More Conveniently with SMS Chat App COMPANY PROFILE: EARLY CONNECT Early Connect is a regional SaaS ISV founded.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Accessing HRMS Off Campus Two-Factor Authentication and Wyosecure.
Implementing and Managing Azure Multi-factor Authentication
Secure Single Sign-On Across Security Domains
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Taewan kang, Kevin huangfu
Adaptive Authentication
First-time Login to Business Banking:
Office 365 Identity Management
Multifactor Authentication & First Time Login
smartmail & smartportal: Introducing Two-Factor Authentication
Multi-Factor Authentication
Presentation transcript:

Stephen Crick Business Development Manager Tokenless™ Authentication

SecurEnvoy Overview UK company - Founded in 2003 Inventors of Tokenless ™ Authentication Represented in 38 Countries (and growing) 700 global customers ¾ Million End User Devices Pure Channel Partner Sales Model Private and profitable company

Who uses SecurEnvoy? © 2009 Copyright SecurEnvoy Ltd. All rights reserved

SecurEnvoy Products SecurAccessSecurICESecurPasswordSecurMail

Evolving User Base

Mobile Workforce Technology is driving mobility Consumer and Business devices are becoming the same thing Social Networking is driving communications and business Connect Anytime, Anywhere on-demand Make it Secure and not Complex

Simple Facts Usability – Consumer / End User

Simple Facts Versatility – Technology / Capability

Simple Facts Simplicity – Administration

Simple Facts Cost – Upfront / On-going

Two Factor Authentication Factor One – Something You Know Factor Two – Something You Have

Problems With Passwords “Social engineering” Finding written password –Post-It Notes –10 PIN’s a day! Guessing password / pin –Dog / Kid’s name / Birthday Shoulder surfing Keystroke logging –Can be resolved with mouse based entry Screen scraping (with Keystroke logging) Brute force password crackers –L0phtcrack

Are you Secure?

Protect Yourself / Company Compliance –PCI –Sox –HIPAA –Government / Military / Education –E-Initiatives Policy –Stronger Security It’s now Your Digital Profile! –Your money –Your identity

Adding Another Level Something You Know Something You Own Andyk P0stcode

Deploying 2FA

Tokenless ™

SecurAccess

Tokens Vs Tokenless ™ Traditional Tokens Usability –Extra hardware –Usually extra complexity to login –Not globally recognised Simplicity –Nightmare to manage –Extra Servers –Extra Databases –Extra Security Required –Extra maintenance Versatility –Usually One solution per item Cost –Expensive upfront and ongoing Tokenless ™ Usability –Uses what you already have (5 Billion Phones globally) –Intuitive process for login –Everyone understand SMS and Phones Simplicity –20,000+ users deployed in an Hr –Uses what you already have NO Extra Servers NO Extra Databases NO Extra Security Required NO Extra maintenance Versatility –Can support multiple apps Cost –Around 60% cheaper

SMS or Soft Token

SMS - Reliability

SMS – Secure? Phone Trojans –Need to install on the phone? Seed Record Hacking –No seed records Man in the Middle –User alerted on login attempt –Session cookie is fingerprinted –OTP – once the code is used it is locked / changed SMS capturing –User alerted on login attempt –Without Username & Password what is the SMS for? –Unidirectional – not susceptible to DDoS attacks

One SMS Solution? Real Time –What is true Real Time Flash vs Pure Text –What if there is no network coverage? –What if there are delays? Pre-Load –Available Now –Multiple Code Options –Still Secure –Uses SMS protocol to simplify Web Gateway / Modem –Voice / SMS / Pager

SecurMail

Password Reset Traditional Method Separate Database of user information User Enrolls with security questions Mothers Name First School Child Name First job Street name Traditional approach User answers a random set of security questions EnrollmentPassword reset User resets password via API Password Reset Complete This approach circumvents any password history checking

SecurPassword All User data stored in LDAP (AES 256 bit) Supported LDAP servers: Microsoft AD Novell e-Dir Sun One Linux IBM Enrollment User Enabled upon SecurEnvoy server User sent automatic enrollment request User selects Security questions User provides Security answers User Authenticates with Two-Factor User enrollment process complete

Self Service Reset User enters passcode and security answer User enters new password User selects password reset link Password policy elements are displayed

SecurEnvoy Usability – Consumer / End User Versatility – Technology / Capability Simplicity – Administration Cost – Upfront / On-going

Case Study T-Mobile (UK) – Mobile Telecoms Company –RSA User – 2000 approx. Change? Cost / Complexity – admin contractors etc. –SecurAccess – 6000 approx. –Competition Cryptocard Swivel –Reasons for choosing SecurAccess Simplicity – Administration / Msoft AD integration Cost savings (initial and ongoing) –Other benefits Deployed over a weekend Scripted for all new users – self administrating

Case Study Sykhuspartner (Norway) – Health Services –New user requirement – 70,000 users –SecurAccess – 25,000+ approx. –Competition SMS Passcode RSA –Reasons for choosing SecurAccess Simplicity – Administration / Msoft AD integration Cost savings (initial and ongoing) Reliability for delivering SMS (pre-load) –Other benefits Now looking at SecurPassword – 70,000 users

Case Study Imperial Tobacco (Global) –RSA User & SecurAccess – approx. Change? Cost / Complexity –SecurAccess – 7500 approx. –Competition RSA Vasco –Reasons for choosing SecurAccess Simplicity – Administration Cost savings (initial and ongoing) –Other benefits Due to RSA breach moving all over to SecurAccess Ability to support SMS Gateways Delivery of SMS

Case Study