Download presentation
Presentation is loading. Please wait.
1
Solutions overview 2018
2
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
About iDENprotect We are a team of experts from Financial Services, Government, Telecoms and the Retail sectors with solid experience in Identity and Access Management, Public Key Infrastructure, Compliance and Regulations UK Headquarters London UK Software Development Centre Leeds Worldwide network of partners © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
3
Cyber security in a connected ecosystem
One of the key cybersecurity challenges for businesses in present day is finding a reliable way to verify and trust the identity of users without restricting efficiency and productivity Can you trust the people accessing your company data? © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
4
Why is trust important to enterprise transactions?
In a case of: Bob and Alice are employees of Company X. They need to log in their business s with the intention to exchange messages. How can Company X be sure that Bob and Alice are indeed who they say they are? How can Bob be sure he is indeed reading an sent by Alice and vice versa? Company X Bob Alice © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
5
Public Key Infrastructure (PKI)
Trust is built on artefacts issued by a trusted party that are difficult to forge or steal- just like passports. In PKI your private key is the equivalent of a passport. Proving you own the private key is proving you are who you say you are. Traditionally PKI uses either purpose-built hardware that you plug into a computer or soft certificates distributed via software. Company X Trust Authority Bob Alice © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
6
Hardware tokens Software tokens
VS Hardware tokens provide the highest self-contained security. However, they are clunky to use, expensive to deploy, don’t have a trust aspect and have only one basic function. Software tokens are designed for ease-of-use but they share memory and resources with everything else on the device. Which means they are easy to attack, susceptible to cloning and have an increased risk of software vulnerabilities. Why is Hardware a Better Security Option Than Software Only? Hardware provides self-contained security and does not require the help of any additional resources Dedicated hardware cannot be affected by other influences such as malicious code infection, OS vulnerabilities and unauthorised access. Hardware offers stronger resilience against some common, not-so-sophisticated attacks Resilience against brute-force attacks to a hardware-encrypted system Hardware based Crypto modules can shut down the system and security purge data after a certain number of password-cracking attempts Access controls are stronger and cannot be manipulated via software What are the Benefits of Using the Trusted Execution Environment (TEE) or Secure Enclave (SE) We can utilise the security on the mobile device to provide security that is as strong as traditional segregated hardware based security We can scale up in the same way as a software solution The user does not need to carry around a second device The solution is much more stronger than security held in software only – all of our competitors are using obfuscated security in software – SECURITY THROUGH OBSCURITY !! NOT GOOD!! The cost of sale is significantly lower for us due to it essentially being a software solution but using something that exists on nearly all modern smartphone devices. We use full PKI and certificate based authentication for the most secure authentication – Just like a smartcard! iDENprotect Positioning iDENprotect’s unique approach to utilising a key managed in hardware is much more than a key stored in software We therefore say we are able to replace smartcards and smartcard readers with a more simple user experience and cost effective solution, using certificate based authentication….WITHOUT COMPROMISING SECURITY! We provide an SDK for mobile platforms that can be integrated into bespoke applications or combined with Mobile Management Solutions such as Blackberry We will be releasing a version that will work on Windows that will authenticate and verify the user on the mobile first then will provide certificate based authentication to Windows
7
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
We believe that providing trust should be more flexible than using hardware tokens and more secure than using software tokens. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
8
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Our technology ensures security and trust by combining the advantages of hardware and software whilst removing disadvantages such as inflexibility, clunky usability, poor security and high costs. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
9
Harnessing hardware-backed security
iDENprotect utilises the device’s own security hardware (Secure Enclave or Trusted Execution Environment) and uses it as a vault to create and store a private key that cannot be copied or manipulated. This means that iDENprotect provides security that is as strong as traditional hardware tokens and as scalable as a software solution - with assurance and trust. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
10
How iDENprotect makes devices “trustworthy”?
Enrolment request with Server Key pair generated in security hardware Signed with iDENprotect Trust Authority Device Enrolled © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
11
iDENprotect Trust Authority
Bob’s Device Alice’s Device Company X iDENprotect Trust Authority iDENprotect PKI Hardware-backed security combined with a chain of trust to the iDENprotect Trust Authority means that Bob and Alice can use their devices to identify themselves or to authorise transactions. Because their identities are “locked” to their devices and their devices are enrolled to the iDENprotect server, the enterprise can trust they really are Bob and Alice. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
12
The benefits of iDENprotect PKI
Eliminates the expense and inconvenience previously associated with PKI technology Increases workforce mobility without exposing company data to security threats Easy integration with existing enterprise infrastructure Eliminates cost for password management and related support Provides proof of the integrity and origin of data Secures data lifecycle © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
13
Secure Application Provider BlackBerry Dynamics Integration
Our solutions adapt to your needs all the while increasing usability, efficiency and productivity Secure Remote Access Single Sign-On Secure Application Provider BlackBerry Dynamics Integration Windows Logon
14
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Works with our Mobile Authentication Client available for iOS and Android Provides a Central Management Server Provides secure VPN remote access Benefits from our simple multifactor authentication solution Integration with Biometric Sensor SAML2 based Single Sign-On Secure Remote Access © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
15
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
iDENprotect Authentication Portal Authenticate once to access all compatible services Improve productivity and maintain security Single Sign-On © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
16
Secure Application Provider
iDENprotect SDK Easy to integrate with your own applications Supports Android and iOS applications Provides the full functionality of iDENprotect PKI Key creation, certificate signing, biometric authentication Secure Application Provider © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
17
BlackBerry Dynamics Integration
Out of the box simple and secure integration with the BlackBerry Dynamics Framework Provide a more robust and secure access to BlackBerry Dynamics Support mutual authentication to Intranet sites via BlackBerry Access Single Sign-On between BlackBerry Dynamics applications Provide digital signature capabilities and signing s with BlackBerry Work Meets non-repudiation requirements BlackBerry Dynamics Integration © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
18
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Logon to a Windows Domain or log into a Remote Desktop connection using our wireless smartcard iDENprotect plus Customise the operations and GUI of the Logon experience using the iDENprotect Windows SDK. Provides a Cryptographic Service Provider (CSP) to integrate with MS Office applications to digitally sign documents and s Includes a GUI application to access iDENprotect plus operations for maintenance and enrolment of the cards An SDK to provide support for iDENprotect plus cards in your own Windows applications Windows Logon © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
19
Our solutions delivery
On-premise via iDENprotect server Easily roll out iDENprotect trust solutions either using our built-in Certificate Authority and database or integrate with your own. It provides the technologies and processes required to enrol your users and devices. Available as an ESX Virtual Machine or RPM. Off-premise via iDENprotect cloud Provides the same core features as the iDENprotect server but available as a cloud instance. Our cloud solution is based on the AWS infrastructure and all its benefits.
20
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Licensing Perpetual licenses Subscription licenses Cloud SMB Bundles (up to 750 Users) © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
21
The products supporting our solutions:
Mobile clients iDENprotect The application that turns your device into a cryptographically trusted device for use with our remote access solutions. Full security requires handsets with Secure Enclave or Trusted Execution Environment. iDENprotect for BlackBerry An application developed for our integration with Blackberry Dynamics framework. It allows iDENprotect to be the Authentication Delegate for BlackBerry. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
22
The products supporting our solutions:
Client side products iDENprotect plus Bluetooth low energy card device which acts as a vault for storing private keys and certificates. It can be deployed as part of an iDENprotect solution or as part of a bespoke solution using the iDENprotect SDK. iDENprotect SDK Allows app developers to add secure access and trust to their bespoke applications without the burden of dealing with the low level complexities of PKI and Secure hardware. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
23
The products supporting our solutions:
Server side products Authentication portal Handles the authentication processes for the Secure Remote access solutions and provides Web SSO capabilities with compatibles services. iDENprotect Credential Provider Integrates with Windows PKI to log in to a Windows Domain using an iDENprotect plus card. The certificate operations and GUI can be customised to suit your branding and UX requirements. © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
24
The products supporting our solutions:
Server side products iDENprotect server Web console Web-based portal for easy management of iDENprotect server iDENprotect cloud portal Web-based portal for easy management of iDENprotect cloud © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
25
© Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Unit 5, Baden Place London, SE1 1YW +44 (0) © Copyright 2018, Apply Mobile Limited. All rights reserved - Internal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.