CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel.

Slides:



Advertisements
Similar presentations
B-CERB complete protection against phishing copyright 2008 by Wheel.
Advertisements

McAfee One Time Password
School Management Tracking Solutions
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Two Factor Authentication (TFA) is a 100% Open Source, free to use security system for your Joomla site’s backend. Two Factor Authentication works in.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Certificate Management Using Distributed Trusted Third Parties Alexander W. Dent Joint work with Geraint Price.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
School Management Software
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
The Office of Information Technology Two-Factor Authentication.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
STOCK CONTROL SOFTWARE. INTRODUCTION Stock Control Software is an integrated accounting system which takes care of all business needs. It incorporates.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Pricing Strategies for iOS Applications
CCT355H5 F Presentation: Phishing November Jennifer Li.
Archiving Solutions Software vs. Hosted vs. Appliance Based.
INTERNET SAFETY FOR KIDS
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
FriendFinder Location-aware social networking on mobile phones.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Introduction TO Network Administration
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Methods of Tracking Position i Pod Touch – Wi-Fi used to find location by detecting known hotspots. iPhone – Cellular triangulation uses the mobile communication.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
24X7 SERVER SUPPORT AND SERVER MANAGEMENT
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
CLOUDENTIFY.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
PrinterOn Mobile Printing Platform
IT Security Awareness Day October 19, 2016
ActivID Tap Authentication HID Global
Binance Support Contact Details :- USA Binance Support Phone Number Help to solve Urgent Financial Troubles.
Modular Object Scanning Technology (MOST)
9 ways to avoid viruses and spyware
Emerging technologies-
Internet Engineering Course
Multi-Factor Authentication
Presentation transcript:

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 2 How does a typical authentication work? Jan.Kowalski **********

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 3 Various methods of authentication available on the market

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 4 We notice an increasing popularity of token-based solutions which are relying on mobile phones, and we anticipate that 50 per cent of the future market of two- component authentication will be using this form of protection. Dr. Allan, market research vice-president, Gartner 4 Information from the market

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 5 According to Accenture research

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 6 CERBToken for BlackBerry CERBToken for Windows Mobile CERBToken for Java Mobile CERBToken – an ultimate method of authentication in CERB CERBToken for iPhone now in AppStore !

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 7 CERBToken application One time passwords generator on Your mobile phone

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 8 CERBToken application, how to use it? Login to your account User name Password John Kowalsky login

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 9 CERBToken application, how to install it? Company User The user individually downloads the universal CERBToken application The user provides the phone number and receives a dedicated CERBToken Light application (via WAP-Push) or

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 10 Where the CERB can be used? VPN Web site Web mail Network devices UNIX systems Other applications

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 11 Easy integration!

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 12 CERBToken application, why use it? maximally straightforward service; mobile phone is always with us; security is higher than in case of equipment tokens; trust of financial institutions towards the security of the solution;

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 13 forgetting or losing the password; spying out the password by an outsider while typing it in; writing passwords on easily accessible places; sniffers and trojans in operational systems; problems with stolen/lost/forgotten equipment tokens; techniques of swindling the password - phishing; 13 CERB system, what does it protect against?

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 14 CERB system, management 14

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 15 CERB is not only the CERBToken! We offer also other modules of authentication: SMSToken scratch off cards, , other equipment tokens of third parties

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 16 CERB system, total cost of using CERB system maintenance costs, increasingly year-round support logistics costs (only the cost of SMS’s) no costs in case of lost applications no costs of appliction renewal Maintenance costs of a system based on equipment tokens, increasingly year-round support logistics costs (delivery of devices) costs of lost devices (lost, broken - usually around 10%) costs of devices renewal (usually after every 3 years) comparison of total costs after 5 consecutive years of using for users

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 17 easy integration with currently possessed systems (RADIUS); perfectly known methodology / technology of one-off passwords; possibility of gradual migration (service of tokens of third parties); only the server is valued; there is no extra fee for cluster configuration; there is no need to renew tokens every couple of years; no logistics costs; valuation in Polish Zloty (no currency risk); StarterBox for 25 users costs only 2280 euro! - net price CERB system, why is it worth using especially nowadays?

CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel 18 CERB system, our references

Thank You. Time for questions. copyright 2009 by Wheel, contact: