1 May 5, 2000Confidential Information of Entegrity Solutions PKI Forum Workshop Art Goldberg SVP –Corporate Development and Chief Strategy Officer.

Slides:



Advertisements
Similar presentations
3SKey 3SKey.
Advertisements

Ray Ozzie Chief Software Architect. Applications and Solutions Cloud Infrastructure Services Live Platform Services Global Foundation Services Services.
TriZetto Transformation Services TriZetto Web Development.
 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
A.Vandenberg August 7, 2001 HE PKI Summit State of Georgia and PKI Art Vandenberg Director, Advanced Campus Services Information Systems & Technology.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
PKI Application in Financial Institution Beijing HiTRUST Technology Co., Ltd. Product Manager Michael Liu
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Understanding Active Directory
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey E-Commerce.
Public Key Infrastructure Ammar Hasayen ….
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Ranked one of the Top 10 fast growing hosting solutions companies in Southeast Asia.
Prepared by Niteo Partners: An NEC Company Security Requirements for Financial Web Services XML Web Services One Conference Forum on Security Standards.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
CREATING ONLINE COMMUNITIES: ISP & PORTAL SPACE. ISP: The Stakeholders Users ISP Telco ISP Buys Access Wholesale ISP Sells Access Retail Pays Telco for.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Payment Systems Electronic Authentication Michael Versace Retail Payments Office Federal Reserve Banks June 1999 Retail Payments Office Federal Reserve.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Using Public Key Cryptography Key management and public key infrastructures.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Review of ASP/SAS benefits and Web-based Concepts.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Digital Signatures and Digital Certificates Monil Adhikari.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
CustomSoft ASP.NET Web Services CustomSoft ASP.NET Web Service is a web application & software development technology. CustomSoft team consists of ASP.NET.
ABOUT COMPANY We are a small group of entrepreneurs who dream big and intend to change the way that administrative software is sold and implemented in.
Key management issues in PGP
Secure Connected Infrastructure
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Azure Infrastructure for SAP®
Data and Applications Security Developments and Directions
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
ONC P2 FHIR Ecosystem Task Force
Bascom Technologies You have tried the rest now try the Best!
What ACS Can Do For Me?
What ACS Can Do For Me?.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
State CP Model (“Discussion Draft”)
Presentation transcript:

1 May 5, 2000Confidential Information of Entegrity Solutions PKI Forum Workshop Art Goldberg SVP –Corporate Development and Chief Strategy Officer

January 7, 2016 Confidential Information of Entegrity Solutions “Why PKI Ain’t Happenin… “Why PKI Ain’t Happenin…” “at the rate that we had expected and hoped! ”

3 May 5, 2000Confidential Information of Entegrity Solutions The Top Four Reasons Why “PKI Ain’t Happenin’”… 1.Lost sight of the “Proportionality Principle” 2.Infrastructure doesn’t solve business problems… and solutions that utilize it have been few and difficult 3.PKI Industry is fragmented and does not support interoperability 4. It is expensive to put in place a PKI infrastructure

4 May 5, 2000Confidential Information of Entegrity Solutions 4. It is expensive to put in place a PKI infrastructure Initial investments can be very high Issuance of certificates to the entire community is time consuming and cumbersome Certificates are not for ever and need to be maintained Outsourcing only addresses the initial investment costs

5 May 5, 2000Confidential Information of Entegrity Solutions 3.PKI Industry is fragmented and does not support interoperability No two certificate authorities issue certificates that are identical Standards have not matured Cross certification is still a dream Client side software – “Heavy vs. thin (non) client”

6 May 5, 2000Confidential Information of Entegrity Solutions 2.Infrastructure doesn’t solve business problems… and solutions that utilize it have been few and difficult Few packaged PKI enabled applications exist. Integration into the applications has been time consuming, expensive, and difficult. The PKI infrastructure doesn’t solve basic problems: –e.g.: Single Sign On Long keys do not make up for insecure practices and facilities.

7 May 5, 2000Confidential Information of Entegrity Solutions 1.Lost sight of the. “Proportionality Principle” Only 5%-10% of the applications require the “complete” security that PKI promises. Less expensive techniques are available as alternatives to PKI for most applications. Access Management is where the majority of customers are going… with Userid/Password as the dominant authentication method.

8 May 5, 2000Confidential Information of Entegrity Solutions The Entegrity Solution Trust Solutions Custom Standard We Build… Delivering… Security: Authentication Authorization Privacy Integrity Non-repdiation & Trust: Application Interoperability Access to Trust Service Providers Access Management NetCrusader (Common Authentication ) Directory SafePages Web CORBA EJB SDP PKIAuthorization Trust Services Platform Using… Professional Services Trust Application Hosting (ASP) Supported By… ©

9 May 5, 2000Confidential Information of Entegrity Solutions For Enterprises doing B2B e-Commerce… AOL The Federal Reserve Bank Identrus BT Penn State University Chase Her Majesty’s Government (UK) Internet Capital Group Such as… & 200+ others….

10 10 May 5, 2000Confidential Information of Entegrity Solutions Scaling and Evolution of Trust Solutions

January 7, 2016 Confidential Information of Entegrity Solutions