1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.

Slides:



Advertisements
Similar presentations
XProtect® Web Client 1 Product presentation.
Advertisements

POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
The team - currently 25 people
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
eToken PKI Client Overview
THE BLACKBERRY® CREDIT CARD CLEARING SOLUTION. eMERIT is a BlackBerry®-based solution that provides a live, 24/7, UK credit card processing solution through.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Chapter 4 Personal Security
Electronic Transaction Security (E-Commerce)
FIT3105 Smart card based authentication and identity management Lecture 4.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
Copyright Security-Assessment.com 2005 Internet Security and Fraud Current Online Trends by Nick von Dadelszen.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
RSA SecurID November 10, 2005.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
DIR-657 HD Media Router 1000 Sales Guide Wireless & Router Product Div. Feb 2011 D-Link WRPD.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Samuvel Johnson nd MCA B. Contents  Introduction to Real-time systems  Two main types of system  Testing real-time software  Difficulties.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Proprietary and Confidential rev. 3/2012 Topic Module Overview 1 Consumer Experience2 Administrator Set-Up3 System Maintenance4 User Maintenance 5 Reports6.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
Identity on Force.com & Benefits of SSO Nick Simha.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Deepnet Unified Authentication for Outlook Anywhere.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Online Parking System.
VirtuCo :: Authentication and Billing ::. VirtuCo v©v© Authentication schemes –Public key –Username and password –Combination –Additional possibilities.
Skill Area 214 Introduce World wide web(www)
Adxstudio Portals Training
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Step 1 Remove the wifi Network which is already connected.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Information Systems Design and Development Security Precautions Computing Science.
YOU NEED A WINDOWS PC COMPUTERS AND OUR INTERNET CAFE SOFTWARE. INSTALL SERVER PART OF THE SOFTWARE ON YOUR MAIN COMPUTER, AND CLIENT PART ON ALL OTHER.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
One Picture 4 Points No Passwords
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Implementing and Managing Azure Multi-factor Authentication
IT Security Awareness Day October 19, 2016
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Cypak core technology Combat fraud and keep your customer happy
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Overview The World Wide Web has changed the way that people
Week 7 - Wednesday CS363.
Presentation transcript:

1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy

2 Fraud is seriously affecting eGaming Phishing - User is cheated to reveal username / password to aliens Pharming / false website - User is cheated to reveal sensitive information on false web-site Key-loggers - Alien code or hardware intercepting keystrokes Trojans - Alien code eavesdropping sensitive information Non-repudiation – User denies performed transaction

3 Hard facts on security Static identities with username and password is not secure - Trivial to intercept and replay. Two-factor authentication needed to provide security – Something to have and to know - Access to service not possible without a device - The user knows if the identity/device has been stolen Secure authentication devices (used for eBanking, corporate login, etc) are today regarded as: - Awkward - Time consuming - Costly

4 Combining security with convenience Cypak eSecurity - Two factor authentication system developed in close dialogue with Scandinavian eGaming industry Cards Keys

5 System components The merchant Authentication Software running on server The end-user Key or card + reader connected to the USB port No client software required ! Works on all platforms !

6 How it works – the Key 1. Key in USB port connects automatically to your site 2. User enter username/password and press button on key 3. Username/pw and a one-time password is sent to the server

7 Key and Card with PIN-keypad PIN entered on Key/Card keypad for additional security Navigation to multiple sites and services

8 Security and system benefits Insensitive to Phishing, Pharming, Key-loggers - A new and unique access code is generated every time Fights issues of non-repudiation and stolen credit cards - Two-factor authentication ties user to performed action Prevents bots - A physical human action required for authentication of player Unbeatable simplicity - Automatic navigation to specific website - Works in parallel with username/password – no extra step - Minimal redesign of existing website - No client software required at all - Works on all platforms (Windows, Mac, Linux, etc.) - Works on all browsers (Explorer, Safari, Firefox, etc)

9 The marketing opportunity Increased trust - For the service provider and the user Brand reinforcement - Corporate profile on Card or Key, exposed in physical wallet or keychain - Customized shapes and colours available for keys and Card readers Enhanced credit limits - Stronger authentication enables higher credit limits Card can be combined with withdrawal functionally

10 For more information or