FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies
|
|
- Emmeline Brook Atkins
- 5 years ago
- Views:
Transcription
1 FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies
2 The Problem The Solution The Alliance Updates
3 Data Breaches 781 data breaches in million records in 2015 (up 50%) $3.8 million cost/breach (up 23% f/2013)
4 The world has a PASSWORD PROBLEM
5 WE NEED A NEW MODEL
6 WE CALL OUR NEW MODEL Fast IDentity Online online authentication using public key cryptography
7 The Problem The Solution The Alliance Updates
8 THE OLD PARADIGM SECURITY USABILITY
9 HOW FIDO AUTHN WORKS The user authenticates locally to their device by various means The device authenticates the user online using public key cryptography LOCAL ONLINE AUTHENTICATOR
10 Passwordless Experience (UAF Standards) 1 2 3? Authentication Challenge Biometric Verification* Authenticated Online Second Factor Experience (U2F Standards) Second Factor Challenge *There are other types of authenticators Insert Dongle* / Press Button Authenticated Online
11 FIDO UAF UNIVERSAL AUTHENTICATION FRAMEWORK Same User as enrolled before? Same Authenticator as registered before? AUTHENTICATOR
12 FIDO U2F UNIVERSAL 2 ND FACTOR Is a user present? USER VERIFICATION FIDO AUTHENTICATION AUTHENTICATOR Same authenticator as registered before?
13 USABILITY, SECURITY and PRIVACY
14 No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No Link-ability Between Services No Link-ability Between Accounts
15 The Problem The Solution The Alliance Updates
16 The FIDO Alliance is an open industry association of over 250 global member organizations
17 FIDO SCOPE Single Sign-On Federation MODERN AUTHENTICATION Authentication Passwords Strong Risk-Based User Management Physical-to-digital identity
18 FIDO Alliance Mission Develop Specifications Operate Adoption Programs Pursue Formal Standardization
19 Associate Members
20 Sponsor Members The image part with relationship ID rid57 was not found in the file.
21 Board Members
22 Our mission is highly complementary to many other associations around the world. We welcome the opportunity to collaborate with this growing list of industry partner organizations. Liaison Program
23 Government Members The fact that FIDO has now welcomed government participation is a logical and exciting step toward further advancement of the Identity Ecosystem; we look forward to continued progress. -- Mike Garcia, NSTIC NPO
24 The Problem The Solution The Alliance Updates
25 FIDO TIMELINE Alliance Announced FIDO Ready Program Specification Review Draft First Deployments FIDO 1.0 FINAL Certification Program New U2F Transports Broad Adoption FEB Members DEC 2013 FEB 2014 FEB-OCT 2014 DEC MAY 2015 JUNE 2015 TODAY >250 Members
26 2014 FIDO ADOPTION Secure Consumer Payments Enabled for Alipay Customers with Easy-to-Use Fingerprint Sensors on Recently-Launched Samsung Galaxy S5 September 17, 2014 PayPal and Samsung Enable Consumer Payments with Fingerprint Authentication on New Samsung Galaxy S5 Feb 24, 2014 Google Launches Security Key, World s First Deployment of Fast Identity Online Universal Second Factor (FIDO U2F) Authentication October 21, 2014
27 2015 FIDO ADOPTION Google for Work announced Enterprise admin support for FIDO U2F Security Key April 21, 2015 Today, we re adding Universal 2nd Factor (U2F) security keys as an additional method for two-step verification, giving you stronger authentication protection. August 12, 2015 Qualcomm launches Snapdragon fingerprint scanning technology March 2, 2015 Microsoft Announces FIDO Support Coming to Windows 10 Feb 23, 2015 Largest mobile network in Japan becomes first wireless carrier to enhance customer experience with natural, simple and strong ways to authenticate to DOCOMO s services using FIDO standards. May 26, 2015 [T]he technology supporting fingerprint sign-in was built according to FIDO (Fast IDentity Online) standards. September 15, 2015 GitHub says it will now handle what is called the FIDO Universal 2nd Factor, or U2F, specification. October 1, 2015
28 2016 FIDO ADOPTION FIDO Universal 2nd Factor (U2F) authentication is now being used to allow all UK citizens to easily and securely access GOV.UK Verify digital public services. Mar 23, 2016 BC Card provides Token and FIDO services to strengthen security and safety of Samsung Pay March 1, 2016 RSA Via Access Server is now FIDO Certified March 1, 2016 NTT DOCOMO is now offering FIDO-enabled biometric authentication for customers using Apple ios devices Mar 7, 2016
29 Deployments are enabled by FIDO Certified products available today
30 OEMs Now Shipping FIDO Certified Devices Samsung S5, Mini Alpha Note 4, 5 Note Edge Tab S, Tab S2 S6, S6 Edge LG V10 & G5 Sharp Aquos Zeta SH-01H, SH-03G Sony Experia Z5 SO-01H, Compact SO-02H, Premium SO-03H Fujitsu Arrows Fit F-01H, NX F-02H, NX F-04G
31 App Developers can add FIDO to any TouchID-enabled device running ios 9+ Supported ios Fingerprint Devices iphone 5s iphone 6, 6+ iphone 6s, 6s+ ipad Air 2, Mini 3 ipad Mini 4 ipad Pro
32
33 FIDO 2.0 & W3C November 2015 February 2016 FIDO Authentication Poised for Continued Growth as Alliance Submits FIDO 2.0 Web API to W3C W3C has accepted our submission Specifications required to define a FIDO-compliant Web API Designed to extend FIDO s existing reach to all platforms OEM community should begin to plan their support now RP community should deploy FIDO 1.x now knowing FIDO standards are future proof -- strategically positioned as the de facto authentication scheme for the Web & OS Platforms W3C Launches New Standards Effort Based on FIDO 2.0 Web APIs W3C announces the chartering of the Web Authentication Working Group Standardizing the submitted FIDO Web APIs can ensure standards-based strong authentication across all Web browsers and related Web platform infrastructure The first meeting of the Working group was early March
34 @FIDOAlliance
A NEW MODEL FOR AUTHENTICATION
All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world
More informationEXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD
More informationWho What Why
Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)
More informationEXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD
More informationFIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017
FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More informationWelcome to the 5G age
Welcome to the 5G age Cristiano Amon Executive Vice President, Qualcomm Technologies, Inc. and President, Qualcomm CDMA Technologies October 2017 @cristianoamon Mobile technology is powering the global
More informationDigital Test. Coverage Index
Digital Test Coverage Index Edition 3 December 2015 Table of Contents Introduction How We Built the Index and How to Read It... Pg. 4 Key Takeaways... Pg. 5 Mobile and Web Indexes by Country U.S... Pg.
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationADOPTING FIDO SearchSecurity
E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2
More informationTECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO
TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TABLE OF CONTENTS Executive Summary... 3 FIDO Solution Requirements... 3 FIDO UAF Client infrastructure... 4 FIDO UAF
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationTHE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS
THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017 1 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017 2 THE FACTS ON
More informationMore than just being signed-in or signed-out. Parul Jain, Architect,
More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance
More informationNext Gen Security Technologies for Healthcare Authentication
Next Gen Security Technologies for Healthcare Authentication Session 261, March 8, 2018 Abbie Barbir, Senior Security Adviser, Aetna Brett McDowell, Executive Director, FIDO Alliance 1 Conflict of Interest
More informationIdentity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition
Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization
More informationDigital Test Coverage Index
Edition 4 April 2016 Digital Test Coverage Index Enhance your customers digital experiences Table of Contents Why We Created This Index... Pg. 3 Introduction... Pg. 4 How We Built the Index and How to
More informationTechnology Strategy Technology and Strategy
Technology and Strategy Danger, Inc. Three key questions Who are the most attractive potential partners to design and manufacture devices for Danger? Who amongst the worlds' many mobile network operators,
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationThe Innovation Connection: How NFC is Driving New Global Opportunities. Koichi Tagawa Sony Chairman, NFC Forum
The Innovation Connection: How NFC is Driving New Global Opportunities Koichi Tagawa Sony Chairman, NFC Forum NFC World Congress September 19, 2011 Marketplace Situation 2 Global Market Developments Business
More informationSmart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012
Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control
More informationMobile Search: Techniques and Tactics for Marketers
Mobile Search: Techniques and Tactics for Marketers Follow along using #mobileppc Eli Goodman & Mike Solomon *Note: A copy of this presentation will be sent to all attendees within 2-3 business days Our
More informationFIDO & PSD2. Providing for a satisfactory customer journey. April, Copyright 2018 FIDO Alliance All Rights Reserved.
FIDO & PSD2 Providing for a satisfactory customer journey April, 2018 Copyright 2018 FIDO Alliance All Rights Reserved. 1 Introduction When PSD2 is deployed in Europe, users will be able to take advantage
More informationAn overview of. Mobile Testing. By André Jacobs. A Jacobs
An overview of Mobile Testing By André Jacobs THE RISE AND RISE OF MOBILE 3 The Apple Story A look at the company that arguably has sparked the explosive growth in smart devices and mobile applications
More informationFINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS
FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS April 2015 Ralph W. Bernstein (Consultant) IDEX ASA and AmberCon 14.04.2015 ralph.bernstein@idex.no ralph@bernstein.no Mobile:+ 47 93059303 www.idex.no IDEX
More informationSupported Operating Systems, Browsers, Networks, and Stores Phone Channel Supported Operating Systems
Supported Operating Systems, s, Networks, and Stores Phone Channel Supported Operating Systems NOTE: Only major versions released directly by OEMs (Apple or any Android hardware manufacturer) are included.
More informationMobile Banking Supported Operating Systems, Browsers, and Networks Phone Channel
Mobile Banking ed Operating Systems, Browsers, and Networks Phone Channel ed Operating Systems (October December 2017) The following outlines the scope of ADK on the Go s operating system and network support.
More informationBango Preliminary results
Bango Preliminary results for 12 months to 31 st March 2011 June 2011 www.bangoinvestor.com - Highlights - Business Progress - Financials - Outlook - Supplementary June 9 th 2009 1 About Bango Bango customers
More informationSmart Card Alliance Member Webinar: Mission Expansion and Name Change. February 22, 2017
Smart Card Alliance Member Webinar: Mission Expansion and Name Change February 22, 2017 Agenda The Changes Ahead Randy Vanderhoof Industry and Market Impact Brian Russell, Board Chair Industry Councils
More informationNational Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign
This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationNatural Security Alliance
Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution
More informationKENYA 2019 Training Schedule
KENYA 2019 Training Schedule Monday Tuesday Wednesday Thursday Friday 4th Feb 5th Feb 6th Feb 7th Feb 8th Feb Using 11th Feb 12th Feb 13th Feb 14th Feb 15th Feb Using (cont...) Field Data Collection and
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationMobile: the foundation of the digital economy
Mobile: the foundation of the digital economy Cristiano Amon Executive Vice President, Qualcomm Technologies, Inc. and President, Qualcomm CDMA Technologies @cristianoamon 1 Mobile technology is powering
More informationCryptologic and Cyber Systems Division
Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,
More informationInternet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m
UAF Protocol Internet is Global 120m 300m 1.3bn Users 160m 289m 300m #Users 2014 Google: 2013 Twitter: 2015 Devices without physical keyboard How Secure is Authentication? Cloud Authentication Password
More informationManual Apple Ipad Mini 2 Release Date 2013 Uk
Manual Apple Ipad Mini 2 Release Date 2013 Uk We've found 8 Apple ipad Mini 2 deals View all deals While it's dropped since the launch of the ipad mini 3, you're still looking at 239 (US$299, AU$369).
More informationLatest Certified Device List Phone Channel (OCT 2016)
Latest Certified Device List Phone Channel (OCT 2016) The following outlines the scope of Mobiliti s general device support. Only devices explicitly listed in the Certified Device List are fully supported.
More informationTECHNICAL WHITE PAPER ENABLING BIOMETRICS FOR MOBILE APPLICATION AUTHENTICATION
TECHNICAL WHITE PAPER ENABLING BIOMETRICS FOR MOBILE APPLICATION AUTHENTICATION Comparing Nok Nok S3 Authentication Suite and Native API Approaches EXECUTIVE SUMMARY In an increasingly mobile world, relying
More informationOperating System Support Plan for Test Delivery System
Operating System Support Plan for Test Delivery System 2017 2018 Published August 7, 2017 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information Distribution
More informationForging the Link Between Global Interoperability and New Business Opportunities
Forging the Link Between Global Interoperability and New Business Opportunities Debbie Arnold Director, NFC Forum WIMA USA November 30, 2011 Marketplace Situation 2 NFC Forum Google Hits Awareness of NFCIncreasing
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationMobiliti. Certified Device List MR6 Release. Last Updated June, ASP Version
Certified Device List MR6 Release Last Updated June, 2015 - ASP Version 2011-2014, Inc. or its affiliates. All rights reserved. This work is confidential and its use is strictly limited. Use is permitted
More informationVESA Display Standards Updates
VESA Display Standards Updates Jim Choate VESA Compliance Program Manager May 3, 2018 Agenda VESA Overview DisplayPort Market Adoption DisplayPort 1.4a Updates VESA Certified DisplayHDR New VESA Technology
More informationWelcome to the Industrial Internet Forum
Welcome to the Industrial Internet Forum Dr. Richard Soley, Executive Director Industrial Internet Consortium Keio University June 3, 2016 The Industrial Internet is leading the next economic revolution
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationW3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption
January 2017 W3C CASE STUDY Teamwork on Open Standards Development Speeds Industry Adoption Like driving a long stretch of open road alone, standards development work can be a lonely endeavor. But with
More informationGrid Code Planner EU Code Modifications GC0100/101/102/104
Grid Code Planner EU Code Modifications GC0100/101/102/104 Place your chosen image here. The four corners must just cover the arrow tips. For covers, the three pictures should be the same size and in a
More informationFIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP
FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com :: @jgrantindc 1 WHAT IS REGTECH? RegTech: Technology
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationOperating System Support Plan for Test Delivery System
Washington Comprehensive Assessment Program Operating System Support Plan for Test Delivery System 2017 2018 Published July 20, 2017 Prepared by the American Institutes for Research Descriptions of the
More informationOperating System Support Plan for Test Delivery System
Indiana Assessment Operating Support Plan for Test Delivery 2018 2019 Published September 18, 2018 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information
More informationOrganizing a Campus Change: Planning for Identity and Access Management Improvements at UF
Organizing a Campus Change: Planning for Identity and Access Management Improvements at UF Dr. Mike Conlon Director of Data Infrastructure June 3, 2008 University of Florida $2B annual revenue, $518M in
More informationSmart Meters and Home Automation
Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing bob.gohn@ember.com Who is? Ember is the leading supplier of ZigBee Semiconductors, Software, and Development Tools Defining Home
More informationHow Mobile is Reshaping Payments
How Mobile is Reshaping Payments Smart Card Alliance Payments Summit April 7, 2016 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston Disclaimer: The views expressed in this
More information1 Introduction Requirements Architecture Feature List... 3
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 3 1.3.1 Device Compliance status... 3 1.3.2 Auto grouping for devices... 4 1.4 Basic Deployment... 4 1.4.1 Prepare
More informationFIDO Alliance Response to the European Banking Authority (EBA)
FIDO Alliance Response to the European Banking Authority (EBA) Consultation on the Guidelines on the conditions to be met to benefit from an exemption from contingency measures under Article 33(6) of Regulation
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationEnrolling for Mobile Money
Enrolling for Mobile Money Log onto Internet Banking Go to Services> Mobiliti Click on Enroll Check the box next to I accept these Terms and Conditions and the continue button will appear after the check
More informationCertification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption
Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;
More informationOpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011
OpenID: From Geek to Chic Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 Why OpenID? Time for a poll Who has reused their same password when logging into a new website? Who has forgotten their password
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationMobile Apps: The Big Picture
Mobile Apps: The Big Picture Chetan Sharma Consulting 9 yr old Seattle based Strategy firm exclusively focused on Mobile Advisor to major operators, brands, startups, VCs, and Fortune 500 firms around
More informationSOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK
RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility
More informationMicrosoft Skype for Business
Microsoft Skype for Business The Next generation of LYNC IM Community OCIO - Operations & Security September 27, 2017 Agenda Past Present Capabilities Statistics Use Cases Challenges Future Skype for Business
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationOperating System Support Plan for Test Delivery System
U.S. Virgin Islands Smarter Balanced Assessments Operating System Support Plan for Test Delivery System 2016 2017 Published October 4, 2016 Prepared by the American Institutes for Research Descriptions
More informationAnnual Membership Meeting. San Francisco, CA June 19, 2014
Annual Membership Meeting San Francisco, CA June 19, 2014 1 Antitrust Statement Although the Cool Roof Rating Council is a broad-based 501(c)3 organization, it does include numerous competitors in the
More informationPartner Verified and Supported Products. Program Guide 6.8
Partner Verified and Supported Products Program Guide 6.8 Copyright 2018 VMware, Inc. All rights reserved. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other
More informationIntroduction of the Identity Assurance Framework. Defining the framework and its goals
Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating
More informationUsing Biometric Authentication to Elevate Enterprise Security
Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of
More informationRCS OVERVIEW. Fábio Moraes GSMA October 2018 Future Networks Programme
RCS OVERVIEW Fábio Moraes GSMA October 2018 Future Networks Programme RCS INDUSTRY MOMENTUM WHAT IS RCS BUSINESS MESSAGING? RCS is an upgrade to SMS on a global scale Universal Profile resolving legacy
More informationMacbook Pro Schematics 13 In Retina Display Release Date
Macbook Pro Schematics 13 In Retina Display Release Date Wondering what happened to the 15in Retina MacBook Pro? Here's our New 2015 15-inch MacBook Pro with Retina display release date, specs and UK pricing.
More informationNatural Security Alliance
Natural Security Alliance Biometrics Based Projects: How to Build Trust in biometrics projects? October 7-8, 2014 Barcelona Summary! 3 Key questions 1/ How to succeed biometrics based deployment project?
More informationThe Future of Authentication
The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication
More informationUSGv6: US Government. IPv6 Transition Activities 11/04/2010 DISCOVER THE TRUE VALUE OF TECHNOLOGY
USGv6: US Government Dale Geesey Chief Operating Officer Auspex Technologies, LLC Phone: 703.319.1925 Fax: 866.873.1277 E-mail: dgeesey@auspextech.com Web: www.auspextech.com IPv6 Transition Activities
More informationUser Guide Advanced Authentication - Smartphone Applications. Version 5.6
User Guide Advanced Authentication - Smartphone Applications Version 5.6 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.
More informationidenprotect Enrolment Walkthrough Apply Mobile
idenprotect Enrolment Walkthrough Apply Mobile Version 1.0 draft, November 7th, 2017 This walkthrough describes how you can enrol your mobile device or a idenprotect PLUS Token as an idenprotect Device
More informationCoursework Completion
Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students
More informationAuthentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair
Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services
More informationBarclay s 2009 Worldwide Wireless and Wireline Conference
Barclay s 2009 Worldwide Wireless and Wireline Conference MAY 28, 2009 Steve Mollenkopf Executive Vice President, & President, Qualcomm CDMA Technologies Safe Harbor Before we proceed with our presentation,
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationMulti-Screen-TV and Over-The-Top TV
Multi-Screen-TV and Over-The-Top TV Stefan Jenzowsky Head of Multimedia Siemens Communications, Media and Technology It s just a website September 17, 2005 The Economist announces the death of the traditional
More informationFORWARD THINKING FOR SPECTRUM
FORWARD THINKING FOR SPECTRUM Getting ready for 5G GSMA-GSA seminar, ITU World Telecom 16 th November 2016 Co-hosted by Panel Progress and advances in 5G trials and the importance of spectrum harmonization
More informationAttacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)
Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) 08 Jun 2017 K-LUG Technical Meeting Rochester, MN Presented by: Vi Grey Independent Security Researcher https://vigrey.com Who
More informationEmerging Risks in Emerging Payments
CTIA- The Wireless Association Presentation for Federal Reserve Bank Emerging Risks in Emerging Payments November, 15, 2010 Atlanta, GA Kate Kingberger Director, Wireless Internet Development CTIA- The
More informationCross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories
Cross-Operator Identity Services. Ingo.Friese@telekom.de 13. January 2012, Introduction. Successful Telco Identity needs joint R&D. We believe that IdM is one of the most important application enabler,
More informationInformation Technology (CCHIT): Report on Activities and Progress
Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT
More informationMOBILE TESTING REFERENCE GUIDE
SOLUTIONS BRIEF MOBILE TESTING REFERENCE GUIDE If you develop mobile applications, you already understand the why of software testing. You know that testing ensures your applications will perform as expected
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide Pulse Secure John Sammon, Dan Pintal, RSA Partner Engineering Last Modified: July 11, 2018 Solution Summary
More informationMobilink-Network Partial List of Partners
Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the users phone will
More informationCONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President
CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers
More informationIdentity & Access Management
Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY
More informationOpera - Simply The Best Internet Experience. 1Q05 Results. April 29, 2005
1Q05 Results April 29, 2005 Highlights first quarter 2005 New license agreement with Nokia signed New handsets announced: NTT DoCoMo M1000 Motorola A1010 ZTE e3 Home Media announcements: Archos Media Player
More informationOperator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea
Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationAdMob Mobile Metrics. Metrics Highlights. May 2010
AdMob Mobile Metrics Metrics Highlights May 2010 Metrics Highlights Summary While mobile Internet requests are growing rapidly worldwide, there are regional differences in the devices used 92 countries
More informationfor Education Jason Trump Senior Education Specialist - Devices
for Education Jason Trump Senior Education Specialist - Devices a 2 + b 2 = c 2 WATCHING, LISTENING INDIVIDUAL STUDY READING COLLABORATING ASSESSING WRITING PRESENTING Ipad Chromebook Surface Design Principles
More information