Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

McAfee One Time Password
M-PAYMENT SYSTEM (e–WALLET ).
Challenges of Identity Fraud Chris Voice, VP Technology.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
E-banking.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
S ECURITY M ADE S IMPLE Technology leader in modern two-factor authentication via SMS Morten Skovsgaard Sales Manager
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Federated Shibboleth, OpenID, oAuth, and Multifactor | 1 Federated Shibboleth, OpenID, oAuth, and Multifactor Russell Beall Senior Programmer/Analyst University.
Certificate and Key Storage Tokens and Software
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Security Equipment Equipment for preventing unauthorised access to data & information.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Overview of Access and Information Protection
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Cartes America - Secure ID: Fraud and ID Management Part 1 Track Personal Identity Verification (PIV) Case Study within the TSCP Community Keith Ward TSCP.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
BUSINESS B1 Information Security.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
November 2003 Presented to “Commercializing RDF” Semantic Software Solutions for Enterprise Web Management International World Wide Web Conference 2004.
Today’s Lecture Covers < Chapter 6 - IS Security
“Stronger” Web Authentication: A Security Review Cory Scott.
Profits, Right Before Your Eyes. Instant Image Verification.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Identity Assurance Emory University Security Conference March 26, 2008.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Building a Fully Trusted Authentication Environment
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Access Control / Authenticity Michael Sheppard 11/10/10.
SEC835 Identity and Access Management Overview. Tasks of IAM Specify the rules of electronic identity Maintain identity Validate identity Define access.
CSCE 201 Identification and Authentication Fall 2015.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
F5 APM & Security Assertion Markup Language ‘sam-el’
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
MOBILE PAYMENTS (“M-PAYMENTS”) August 2007 Potential impact on South African banking industry Team Galahad Lionel Diakanyo Joshua Makgate Sean Rule.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Identity and Access Management
Secure Connected Infrastructure
Secure Single Sign-On Across Security Domains
DATA SECURITY FOR MEDICAL RESEARCH
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
State of e-Authentication in Higher Education Bernie Gleason
Office 365 Identity Management
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Presentation transcript:

Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 2 Anakam - Company Summary  Leading provider of large-scale, cost-effective multi-factor authentication solutions – The Anakam Identity Suite ®  Integrated suite of identity management offerings; proven set of industry-leading products  Strong IP position with six patents pending  Initial focus on high-growth verticals (Government, Healthcare, Public Sector, Financial Services)  Heavily regulated industries where traditional authentication platforms do not adequately protect end user identity  Name brand customer wins across target sectors are driving tremendous business momentum  Highly experienced management team - Accenture, Oracle, Siebel, Symantec, Microsoft, IBM, Federal and DoD  Rapid growth in revenue and bookings  Founded in 2004; Product launched in 2006  Headquartered in San Diego, CA  Federal HQ in Arlington, VA Two Factor Authentication Identity Proofing Identity Verification Credentialing Gateway On-Demand Identity VPN Connector Secure Collaboration

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 3 What is Authentication? Is it Necessary? Authentication enables rapid, efficient communication and information sharing within organizations, between organizations, and with customers/users UsersIdentity Authentication confirms a user’s claimed Identity with a given level of Trust Trust in Identity enables a number of critical capabilities for organizations Entitlements Permissions Roles Audit Trails Security Safeguards Organizational Control Organizational and User Accountability Risk Mitigation

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 4 4 Quick Second Factor Authentication Review  First or Single Factor Authentication  Something you know: I.D./password  Second Factor Authentication for Online Applications  Something you have: Hard token, soft token, one-time password device, etc.  Similar to an Automated Teller Machine (ATM)  Something you know: PIN code  Something you have: Debit card  Second Factor Authentication is an effective mechanism to provide assurance of the identity of a person conducting an electronic transaction.

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 5 Traditional Authentication Approaches Traditional Second Factor Authentication Authenticating network users with a user name and password Hard tokens, smart cards, USB devices, biometrics  Expensive to deploy and maintain  Burdensome on the individual to carry  Prone to loss, theft, and obsolescence  Actually don’t identify the identity of the user  Too administratively cumbersome for most applications, particularly citizen- facing portals with millions of users  If known by a perpetrator, he/she can easily compromise a single account or potentially an entire network  Has led to a need for second factor authentication for important/sensitive information Single Factor Authentication Approach Challenges Market Need Strength of second factor authentication but with lower cost, flexibility to provide progressive authentication and greater convenience Current approaches to authentication do not meet the requirements of a large portion of the overall identity management market

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 6 How we meet this need  Upon successful completion of a first-factor challenge (username/password), Anakam.TFA ® generates a random number passcode and distributes it to pre-registered end-user device(s) (cell phone, home phone, computer, etc.).  The institution’s server then waits for the user to enter a time- sensitive passcode to validate that the user still has the “what you have” portion of two-factor authentication.  Current capabilities include:  Cell Phone Text Message (SMS) – One-time Pass code (True Two-Factor)  Synthesized Voice (IVR) to Landline or Cell Phone – One-time Pass code (True Two-Factor)  Voice Biometric Retrieval – One-time Pass code (True Two-Factor)  Account – One-time Pass code  Personal Computer – Encrypted Device ID  Out-of-Wallet Questions – Random Requests for Closely Held Knowledge  e.g., “Mother’s Maiden Name”  Verification Link – Combats “Man-in-the-middle” Attacks  Conditional challenges based upon: IP Geo-analytics, Behavioral Analysis, and optional alternatives Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 7 On-line Authentication for the Masses Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 8 Demonstration

© 2010 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 9 Questions