EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

McAfee One Time Password
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Which server is right for you? Get in Contact with us
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
eToken Virtual and MobilePASS
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
eToken PKI Client Overview
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
RSA SecurID November 10, 2005.
Mark O’Shea Partner Technology Advisor – SMB Microsoft Australia.
Netop Remote Control Trusted. Secure. Experienced.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Page Copyright Giritech A/S an – Excitor company.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Plaza Dynamics Microsoft ® Windows® Small Business Server 2008 and HP ProLiant servers Presented by: The server solution you’ve been looking for.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
SafeWord 2008 Channel Presentation October Agenda  Overview  SafeWord partnerships  SafeWord First Customer Pitch  SafeWord 2008 in Detail.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
Internet Security for Small & Medium Business Week 6
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Building a Fully Trusted Authentication Environment
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
A Global fully incorporated Virtual ecommerce Software Solution.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Copyright 2016, Techarex Networks LLC. | | Call Toll-Free : Benefits Of Hosted QuickBooks For CPA Firms.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Check Point Connectra NGX R60
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

eToken PRO Anywhere

Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing  Getting started with eToken PRO Anywhere

Introduction to eToken PRO Anywhere

The Highlights  What is eToken PRO Anywhere? The first portable, reader-less smartcard token that combines the strength of certificate-based strong authentication with the seamless simplicity of OTP What can you do with it? Securely access web-based online services and corporate networks (SSL VPN) from any computer with an Internet connection and a USB port Digital signature applications  What makes it an innovation in two-factor authentication? Offers complete user mobility (no need to pre-install desktop client software) Simple and easy to use end-user experience No maintenance: never expires and needs no battery replacement

eToken PRO Anywhere – What is it? An enhanced version of the bestselling eToken PRO Access from anywhere with no installation required for: Secure, certificate-based access to online consumer & enterprise services Access to web based applications and (OWA) Digital signing capabilities And.. When inserted into an eToken PKI Client environment, the device is a fully functional eToken PRO device Data encryption Password management Certificate-based security applications

Key Selling Points  Certificate ‐ based USB authenticator can be used on any Windows ‐ based computer with an Internet connection and a USB port  Plug and play: no end ‐ point software installation required  Offers full user mobility  Seamless, simple user experience  No maintenance: never expires and requires no battery replacement  Application rich: ideal for both online services, web-based secure network access (SSL VPN) and certificate ‐ based security applications ‐ from any computer  Reduces TCO by eliminating the cost of maintaining software clients on users’ desktops

Features  PKI certificate-based strong authentication ensures protection from phishing and man-in-the-middle attacks  On-board RSA 1024-bit and 2048-bit key generation, authentication & digital signing  Full PKCS#11 functionality  No battery required ensuring device durability and extended lifetime  In process for FIPS levels 2 & 3  Highly secure smartcard chip; Common Criteria certified  Hardened tamper-evident and water-resistant shell  Full compatibility with standard USB interface  Supports all SSL-based web sites configured for client authentication, including Microsoft IIS based web sites, Microsoft Outlook Web Access (OWA), and SSL VPN Gateways  Integrated secure logical and physical access option

Market Background

Market Drivers Business enablement through expansion of online Web services: More services moving online (banking, healthcare, higher education) Cybercrime posing more of a threat, more focused and more sophisticated – especially in a down economy Extension of enterprise services: More employees working from home More partners, suppliers and contractors need online access to partner portals, digital signature, remote access The need to address risk and compliance Customer/financial information (SOX, Basel II, FFIEC, PCI DSS) Credit card data HR records, healthcare information (HIPAA, HITECH) Mission ‐ critical applications (FIPS, CC)

B2C Market – The Challenge Uncontrolled environment Different kinds of users and levels of technical expertise IT personnel have no access to user computers Ability and aversion to install/update software Different operating systems User convenience is critical Process efficiency Deployment, distribution, provisioning and support mechanism to scores of users Consumers want security but… Are they willing to hassle with installation and support, and pay more? Consumers want security but… Are they willing to hassle with installation and support, and pay more?

Target Markets B2C and B2B organizations that are interested in providing customers, partners and employees with secure access from any computer with a USB port and Internet connection Online financial services Healthcare Higher education Online Services Partner portals and extranets Web-based SSL VPN Uncontrolled access points Digital signature Enterprise Market

Use Case: Online Financial Services  Bank provides eToken PRO Anywhere to customers  Customers can securely access confidential account information from any computer with an Internet connection and USB port  Customers can use digital signing to carry out online transactions  Key Benefits:  Bank can reduce “brick and mortar” costs by moving more customers to online banking  Bank customers can carry out transactions with confidence without having to physically go to the bank  Simple and easy for customers – no software install required Education Health Care eCommerce Finance

Use Case: The Enterprise Story  Employees on the road or working from home require access to web-based enterprise services  eToken PRO Anywhere offers:  Remote access to network, , company portals  PKI functionality when PKI Client is present  Combined physical and logical access when in the office (RFID option)  Key Benefits:  A more productive workforce  Better support for suppliers, contractors and partners  Offers secure access from any computer without the need for software installation, with the addition of full in-perimeter security in the office

Use Case: The Enterprise Story  Partners or contractors who need access to web-based enterprise services  eToken PRO Anywhere offers:  Remote access to partner portals  Digital signature  Key Benefits:  Better support for suppliers, contractors and partners  Secure access from any computer without the need for software installation

Implementation and Pricing

Implementing eToken PRO Anywhere What you need:  eToken PRO Anywhere tokens  TMS eToken PKI client (1 license for the server only) The process (Admin side)  Administrator installs TMS on a dedicated server, and then installs the eToken PRO Anywhere configuration tool  Administrator creates the eToken Anywhere application folder on a host web server  Administrator configures the TMS Anywhere connector for enrollment  Using TMS, administrator enrolls eToken PRO Anywhere tokens for the end users

How It Works for the End User 1.User inserts authenticator into any machine running Win2K and up 2.eToken PRO Anywhere launcher loads 3.Web browser opens 4.User enters authenticator password 5.User securely accesses website

Managing the eToken PRO Anywhere  eToken PRO Anywhere must be used with eToken TMS 5.0  When used in regular eToken PRO mode, needs eToken PKI Client version on client computers What does TMS Offer?  Reduces IT overhead  Streamlines and centralizes token operations for IT administrators  Simplifies the end user experience by offering Web-based self-service, help desk, and administration tools  Scalability  Organizations can easily expand their authentication solutions  Allows mix and match with any other eToken authenticator Why is TMS Required?  Based on product definition decision relating to the focus that the BU is placing on software sales.

Getting Started with eToken PRO Anywhere: Starter Packs  All-in-One packages that include everything needed to set up an eToken PRO Anywhere Solution, at attractive starter pack prices  eToken PRO Anywhere authenticators  TMS  PKI Client  Two versions available  eToken PRO Anywhere “Online Access” Solution Starter Pack  eToken PRO Anywhere “Enterprise Access” Solution Starter Pack

eToken PRO Anywhere demo include: A preconfigured eToken PRO Anywhere demo with authenticator Updated “Five Easy Steps” including default password and work-arounds for common problems Getting Started with eToken PRO Anywhere: eToken PRO Anywhere Demo

THANK YOU