Asseco SEE Authentication Solutions. ASEBA SxS, ASEBA Mobile Token

Size: px
Start display at page:

Download "Asseco SEE Authentication Solutions. ASEBA SxS, ASEBA Mobile Token"

Transcription

1 Asseco SEE Authentication Solutions ASEBA SxS, ASEBA Mobile Token Robert Mihaljek Sales Professional September, Sofia, Bulgaria

2 Agenda About Asseco Threaths User authentication options Our Solution Why Mobile token Q/A 1

3 Asseco Group - General Information 7 th software company in Europe* Growing company with strong foundation More than employees Diversified business profile Concentrated on proprietary software and services *According to Truffle100

4 MASS BU (Mobile and Security Solutions) MASS BU is specialized in the development, integration and implementation of highly customized mobile and security turn-key solutions for the financial industry. hardware tokens EMV CAP mobile token SMS display cards Java phones iphone/ipad/ipod Android OS Windows Mobile OS Strong Authentication Solutions Mobile Banking Solutions E-commerce 3D Secure Solutions PKI SmartCard Digital Signature & Encryption Solutions

5 Most important for the Clients? A solution that is... FAST SIMPLE SECURE 4

6 ... but what about the risks??? Phishing and pharming Keyboard sniffer Man in the middle Man in the browser Trojans / viruses On-line fraud Mules Rogueware 5 19% clicks on a link in 3% gives away personal information (Gartner research)

7 Targets? 6

8 Authentication First line of defense 7

9 Authentication? user/transactions AUTHENTICATION which one? one-factor authentication PIN, PIN + TAN two-factor authentication Tokens EMV CAP Smartcards DisplayCards Mobile tokens 8 8

10 Authentication Higher Risk, More Security YES Authentication Method Tokens/CAP/DisplayCard/Mobile token with keyboard and MAC/MDS (WYSIWYS) Prevents the Attack Phishi ng 2004 Pharmi ng 2005 MitM 2006 MitB 2007 MitPC 2008 MitMo 2010 Nonrepudiatio n YES YES YES YES YES YES YES SMS OTP/TAN YES YES YES YES YES NO NO SmartCard + PKl, two-way SSL, trusted plug-in for transaction signing, PIN-pad reader YES YES YES YES YES N/A YES SmartCard + PKl and two-way SSL YES YES YES NO NO N/A YES Tokens/CAP with keyboard and Challenge/Response YES YES NO NO NO N/A NO OTP Tokens, Grid/Scratch Cards YES NO NO NO NO N/A NO Cookie, Text, Picture YES Maybe NO NO NO N/A NO IP Geo, Device Fingerprint YES Maybe NO NO NO N/A NO Passwords NO NO NO NO NO N/A NO extended table of Gartner research: 2008 Data Breaches and Financial Crimes Scare Consumers Away 9 NO Maybe Does not Prevent the Attack Targeted Attack Required

11 Our solution - ASEBA SxS 10

12 ASEBA SxS - two-factor authentication solution, designed for Internet and Phone banking services that enables non-repudiation and prevents phishing, pharming and man in the middle attacks. Basic Functionalities Single Point of Strong Authentication server Designed to meet the business and regulatory requirements of multi-channel organizations Enables simultaneous use of different types of end-user devices and cryptography standards SW / Tech Support for hardware tokens from different vendors, EMV CAP/DPA, PKI SmartCards/Digital Signature, Mobile Token Authentication (J2ME enabled mobile phones, iphone/ipod/ipad OS, Android OS, Windows Mobile 7 OS), SMS OTP and display cards. Java based server platform and web back-office application Client Benefits Secure banking transactions regardless of channel and technology used.

13 User authentication devices Hardware token SMS OTP SIM Sticker EMV CAP/DPA compliant reader TAN/Grid Cards ASEBA Mobile token DisplayCard Java BlackBerry iphone Android WP7 Almost 100% of mobile phones in the market supported!

14 ASEBA Mobile token Solutions for Demanding Business

15 Mobile token Mobile token is a software application securely stored on a mobile phone OTP One Time Password CR Challenge / Response MAC Message Authentication Code MDS Multiple Data Signature ebanking

16 ASEBA Mobile token Functionalities OTP (counter), C/R, MAC (6 10 digits), MDS (1 10 fields) Customization: Multi language, Branding, Color schemes Secure token activation (on-line activation) Unique experience on all mobile phones (menus, colors, forms) PIN Hint Host verification

17 ASEBA Mobile token Look & Feel Solutions for Demanding Business

18 Mobile token vs... Hardware token battery life distribution & storing (operational expenses) mechanical end-of-life cost SMS OTP dependant on mobile operator SMS delivery SIM swap fraud No non-repudiation (transaction signature) high TCO (1 SMS for 1 transaction)

19 ...no, but I do not need this...

20 Our expertise in user authentication Focus on electronic banking channels (ebanking, mbanking, Phone banking, ecommerce) 18 years experience in ebanking security Solution deployed in number of CEE countries ASEBA SxS 5 product protecting more than 20 ebanking s today zero-fraud reported on services protected by Asseco

21 Asseco s Mobile Suite The Concept Mobile Banking Mobile Token Mobile Payment ASSECO S MOBILE SUITE Personal Finance Management ecommerce Loyalty & Couponing

22 Asseco s Mobile Suite All-In-One: Modular Solution! Mobile Banking Mobile Token Mobile Payments Mobile PFM

23 ASSECO S Key Mobile References m-zaba Zagrebačka banka Croatia BankAir UniCredit Bank Slovakia HPB-mBanking Hrvatska poštanska banka Croatia BpB mobile banking Banka per Biznes Kosovo ASEBA JiMBa Asseco Service Center (8 banks) Serbia M-banking Serbia UniCredit Bank Serbia Intesa-m-Token Banca Intesa Beograd Serbia Zaba m-token Zagrebačka banka Croatia KBToken Kredyt Bank Poland Mobilna banka GO UniCredit Bank Slovenia Smart Banking UniCredit Bank Czech Republic m-ba UniCredit Bank Bosnia & Herzegovina Intesa Mobi Banca Intesa Beograd Serbia mpbz Privredna banka Zagreb Croatia MB-m-Token Međimurska banka Croatia NLB Klik NLB Montenegrobanka Montenegro PekaoToken Bank Pekao Poland HPB mtoken Hrvatska poštanska banka Croatia Bulbank Mobile UniCredit Bulbank Bulgaria PBZmToken Privredna banka Zagreb Croatia Intesa-m-Token Intesa Sanpaolo Bank Romania

24 Questions? Solutions for Demanding Business

25 Thank you! Robert Mihaljek Mobile & Authentication Sales Professional

SxS Authentication solution. - SXS

SxS Authentication solution. - SXS SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet

More information

Is Your Online Bank Really Secure?

Is Your Online Bank Really Secure? Is Your Online Bank Really Secure? Zoltan Szalai / ebanking Solution Manager April 25, 2013 2 Gemalto for You ONE THIRD OF THE WORLD S POPULATION USE OUR SOLUTIONS EVERYDAY BANKS & RETAIL TELECOM TRANSPORT

More information

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Protecting Against Online Fraud. F5 EMEA Webinar August 2014 Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture

More information

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

The PKI Lie. The OWASP Foundation  Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking Optimised to Fail: Card Readers for Online Banking Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org Financial Cryptography

More information

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution RSA Adaptive Authentication On-Premise Implementation Guide Partner Information Last Modified: June 12, 2013 Product Information Partner Name Web Site www.monitise.com Product Name Version & Platform 5.0

More information

Digital Identity Trends in Banking

Digital Identity Trends in Banking i-sprint Innovations Identity and Security Management Solution Provider Digital Identity Trends in Banking Banking Vietnam 2017 Proven Bank Grade Identity and Security Management Solution Designed, Architected

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

APG8201 PINHandy

APG8201 PINHandy APG8201 PINHandy Units 2010-2013, 20th Floor Chevalier Commercial Centre 8 Wang Hoi Road, Kowloon Bay, HK Tel: +852-27967873 Fax: +852-27961286 info@acs.com.hk www.acs.com.hk Outline 1. Product Overview

More information

2010 Online Banking Security Survey:

2010 Online Banking Security Survey: 2010 Online Banking Security Survey: ZeuS-Like Malware Rapidly Outpaces All Other Online Banking Threats PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536

More information

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.

More information

An Overview of Secure and Authenticated Remote Access to Central Sites

An Overview of Secure and Authenticated Remote Access to Central Sites Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking PIN Optimised to Fail: Card Readers for Online Banking SecureBank Inc. login: Vic Tim code: 7365 5748 PIN $20 Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer

More information

Online Banking Security

Online Banking Security Online Banking Security Fabian Alenius Uwe Bauknecht May 17, 2009 Contents 1 Introduction 2 2 Secure Communication 2 2.1 Password authentication..................... 2 2.2 One-time Passwords.......................

More information

System to assure authentication and transaction security. Presentation of the concept and product May 2009

System to assure authentication and transaction security. Presentation of the concept and product May 2009 System to assure authentication and transaction security Presentation of the concept and product May 2009 AXSionics AG, Neumarktstrasse 27, 2503 Biel, Switzerland Information: Dr. Lorenz Müller Lorenz.mueller@axsionics.ch

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico 1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become

More information

Account Takeover: Why Payment Fraud Protection is Not Enough

Account Takeover: Why Payment Fraud Protection is Not Enough Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

OTP and Challenge/Response Algorithms for Financial and e-government Identity Assurance: Current Landscape and Trends

OTP and Challenge/Response Algorithms for Financial and e-government Identity Assurance: Current Landscape and Trends WP WP ActivIdentity OTP and Challenge/Response Algorithms for Financial and e-government Identity Assurance P 1 WHITE PAPER OTP and Challenge/Response Algorithms for Financial and e-government Identity

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

Online auhthentication methods. Evaluate the strength of online authentication methods

Online auhthentication methods. Evaluate the strength of online authentication methods Online auhthentication methods Evaluate the strength of online authentication methods Introduction Cornel de Jong System and Network Engineering Universiteit van Amsterdam Spui 21 1012WX Amsterdam Supervisors:

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

PROVE IT! Matt and Dan, Dan and Matt, Those Fookers!

PROVE IT! Matt and Dan, Dan and Matt, Those Fookers! IS THAT REALLY YOU? PROVE IT! Matt and Dan, Dan and Matt, Those Fookers! Agenda slide 2 Who are we? Web Application Security Problems Business Drivers Solution Overview DEMO Who are we? slide 3 Matt Topper,

More information

Deliver Strong Mobile App Security and the Ultimate User Experience

Deliver Strong Mobile App Security and the Ultimate User Experience Deliver Strong Mobile App Security and the Ultimate User Experience The Presenters Will LaSala, Director of Services @ VASCO Will has been with VASCO since 2001 and over the years has been involved in

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

Jrsys Mobile Banking Solutions

Jrsys Mobile Banking Solutions Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Achieving online trust through Mutual Authentication

Achieving online trust through Mutual Authentication Achieving online trust through Mutual Authentication Agenda Where do we need trust online? who are the affected parties? Authenticating the site to a consumer V by V and SecureCode, next generation browsers

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

With VASCO to the top

With VASCO to the top With VASCO to the top Roger Vandeplas Vice President World Wide Sales Agenda day 1 March 14 10.00 Registration at Hotel Metropole welcome desk 10.15 Welcome and kick-off, by Roger Vandeplas, Vice President

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

Mobile Identity Management

Mobile Identity Management Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}

More information

KOBIL worldwide secure online banking. Take the challenge anytime, anywhere

KOBIL worldwide secure online banking. Take the challenge anytime, anywhere KOBIL worldwide secure online banking Take the challenge anytime, anywhere KOBIL stands for secure data and secure communication on any computer in the world. Whether it is for business or private use,

More information

Ling Hsieh 謝姈諺 Deputy Sales Manager/ Marketing Department

Ling Hsieh 謝姈諺 Deputy Sales Manager/ Marketing Department Ling Hsieh 謝姈諺 Deputy Sales Manager/ Marketing Department Changing Information Tech. Top 1 branded cyber security company focus on PKI & MOTP among domestic and foreign brands. YoY growth is over 100%

More information

COMPLETING THE PAYMENT SECURITY PUZZLE

COMPLETING THE PAYMENT SECURITY PUZZLE COMPLETING THE PAYMENT SECURITY PUZZLE An NCR white paper INTRODUCTION With the threat of credit card breaches and the overwhelming options of new payment technology, finding the right payment gateway

More information

How I Learned to Stop Worrying and Love the Internet of Things

How I Learned to Stop Worrying and Love the Internet of Things SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity

More information

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users

More information

APG8201 PINhandy 1. Technical Specifications. Subject to change without prior notice

APG8201 PINhandy 1. Technical Specifications.  Subject to change without prior notice APG8201 PINhandy 1 Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical Specifications...

More information

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free! LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Sagem Orga Strong, Global, Innovative.

Sagem Orga Strong, Global, Innovative. Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence

More information

Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg Phishing & Identity Theft Historically most online banking done with passwords (single-factor authentication)

More information

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing 1 WhiteHat Security Application Security Company Leader in the Gartner Magic Quadrant Headquartered in Santa Clara, CA 320+

More information

Remote Key Loading Spread security. Unlock efficiency

Remote Key Loading Spread security. Unlock efficiency Remote Key Loading Spread security. Unlock efficiency Cut costs increase security A smarter way to do business The hacker community is growing increasingly sophisticated which means the financial community

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

FRAUD DETECTION IN ONLINE BANKING. The recent shift in security model at Landsbankinn

FRAUD DETECTION IN ONLINE BANKING. The recent shift in security model at Landsbankinn FRAUD DETECTION IN ONLINE BANKING The recent shift in security model at Landsbankinn What shift? In the last year we did a significant alteration of our security model in the Personal Online Bank. When

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

Sybase, an SAP Company

Sybase, an SAP Company Sybase, an SAP Company www.sybase.com Analysis and Reporting Unmatched Query Performance Storage efficiency of structured Data Heterogeneous Environment Unstructured Data Data Warehouse Exceptional Performance

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER 1 The Background to the WIZZIT Authenticator THE EVOLUTION OF AUTHENTICATION At its most basic level, bank grade authentication is built around a simple concept

More information

Unique Phishing Attacks (2008 vs in thousands)

Unique Phishing Attacks (2008 vs in thousands) The process of attempting to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In the 2 nd half

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Cloud sicherung durch Adaptive Multi-factor Authentication

Cloud sicherung durch Adaptive Multi-factor Authentication Cloud sicherung durch Adaptive Multi-factor Authentication Lars Gotlieb Regional manager DACH Lgo@smspasscode.com Marktbewährte Technologie Selected References 2 Marktbewährte Technologie Selected retail

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

AND RISK ASSESSMENT IDENTITY MANAGEMENT ONLINE/MOBILE

AND RISK ASSESSMENT IDENTITY MANAGEMENT ONLINE/MOBILE IACA ONLINE/MOBILE IDENTITY MANAGEMENT AND RISK ASSESSMENT Jay Johns Global Partner Manager May 2017 ABOUT US About Us FOUNDED: 2004 SOLUTIONS: Fraud Prevention and Authentication HEADQUARTERS: Portland,

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Phishing is Yesterday s News Get Ready for Pharming

Phishing is Yesterday s News Get Ready for Pharming April 2005 Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

AS emas emudhra Authentication Solution

AS emas emudhra Authentication Solution AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a

More information

Display Cards for Securing E Commerce

Display Cards for Securing E Commerce Display Cards for Securing E Commerce Don Malloy Business Development Manager 10th February 2012 Salt Lake City Nagra Kudelski Group Activity Lines Group Revenue 2010 : USD 1.1B Physical access solutions

More information

Paystar Remittance Suite Tokenless Two-Factor Authentication

Paystar Remittance Suite Tokenless Two-Factor Authentication Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information

FINGER VEIN SERVER FOR RETAIL BANKS

FINGER VEIN SERVER FOR RETAIL BANKS FINGER VEIN SERVER FOR RETAIL BANKS The Finger Vein Server (FVS) is the heart of Hitachi s VeinID biometric solution for retail banking. A modular Client-Server system designed to support high availability

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

THE RSA AUTHENTICATION DECISION TREE

THE RSA AUTHENTICATION DECISION TREE THE RSA AUTHENTICATION DECISION TREE Select the Best Authentication Solution for Your Business What is the best authentication solution for my business? This is a recurring question being asked by organizations

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Building the Business Case for Strong Authentication

Building the Business Case for Strong Authentication Building the Business Case for Strong Authentication The importance of strong authentication To ensure customers are able to conduct financial transactions whenever they need, from wherever they are located,

More information

Authentication and Fraud Detection Buyer s Guide

Authentication and Fraud Detection Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What

More information

Use Digipass two-factor authentication

Use Digipass two-factor authentication DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass

More information

ACR38U-I1. Smart Card Reader. Technical Specifications V1.11. Subject to change without prior notice.

ACR38U-I1. Smart Card Reader. Technical Specifications V1.11. Subject to change without prior notice. ACR38U-I1 Smart Card Reader Technical Specifications V1.11 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Modern Design... 3 1.3. Ease

More information

NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations)

NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations) NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations) Boris Jevrić Agency for Electronic Communications and Postal Services

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

An insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE

An insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE An insight into the IDP Group from Gemalto Thorsten Krüger Sales Director DACH & CEE The year 2014 was a great year! 2 The Reality: Data Breaches 2014 1,023,108,267 RECORDS EXPOSED as the result of 1,541

More information

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) 08 Jun 2017 K-LUG Technical Meeting Rochester, MN Presented by: Vi Grey Independent Security Researcher https://vigrey.com Who

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m UAF Protocol Internet is Global 120m 300m 1.3bn Users 160m 289m 300m #Users 2014 Google: 2013 Twitter: 2015 Devices without physical keyboard How Secure is Authentication? Cloud Authentication Password

More information

Whitepaper on AuthShield Two Factor Authentication with SAP

Whitepaper on AuthShield Two Factor Authentication with SAP Whitepaper on AuthShield Two Factor Authentication with SAP By AuthShield Labs Pvt. Ltd Table of Contents Table of Contents...2 1.Overview...4 2. Threats to account passwords...5 2.1 Social Engineering

More information

Topics. Ensuring Security on Mobile Devices

Topics. Ensuring Security on Mobile Devices Ensuring Security on Mobile Devices It is possible right? Topics About viaforensics Why mobile security matters Types of security breaches and fraud Anticipated evolution of attacks Common mistakes that

More information

Simplify PCI Compliance

Simplify PCI Compliance WHITE PAPER Simplify PCI Compliance An Affordable, Easy-to-Implement Approach Using Secure SD-WAN For most retailers, the technology burden of maintaining PCI compliance can be overwhelming. Hundreds of

More information

APG8205 OTP Generator

APG8205 OTP Generator APG8205 OTP Generator User Manual V1.00 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Supported Card Type... 3 1.2. Supported Language... 3 2.0. APG8205 Illustration...

More information

THE ROLE OF MOBILE BANKING IN SERBIA

THE ROLE OF MOBILE BANKING IN SERBIA E - BANKING THE ROLE OF MOBILE BANKING IN SERBIA Tijana Radojević 1, Danica Rajin 2, Vladimir Džamić 1, Dalibor Radovanović 1 2 Singidunum University 32 Danijelova Street, Belgrade, Serbia 2 Singidunum

More information

Making the Case for Digital Signatures

Making the Case for Digital Signatures Making the Case for Digital Signatures Save time, money & resources by replacing physical signatures [Partner logo] STAY ENGAGED Type your questions and comments. We ll answer them all at the end of the

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

More than just being signed-in or signed-out. Parul Jain, Architect,

More than just being signed-in or signed-out. Parul Jain, Architect, More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance

More information

Názov prezentácie. Logo partnera

Názov prezentácie. Logo partnera Názov prezentácie Logo partnera Mobile banking more popular than a Facebook? Mobile Dependence Day, ExactTarget report on mobile usage, 2012 Competition is heating up Payment area competition Foreign banks

More information

Unlimited UK mobile calls and unlimited UK texts Bolt On: Unlimited landlines Poland Bundle (400 minutes to mobiles & landlines) 3.

Unlimited UK mobile calls and unlimited UK texts Bolt On: Unlimited landlines Poland Bundle (400 minutes to mobiles & landlines) 3. Unlimited UK mobile calls and unlimited UK texts 10.60 Bolt On: Unlimited landlines 3.60 Poland Bundle (400 minutes to mobiles & landlines) 3.00 1 GB Data 2 GB Data 5 GB Data 10 GB Data BES 1GB (Blackberry

More information

Remote Key Loading. Decoding RKL

Remote Key Loading. Decoding RKL Remote Key Loading Decoding RKL What is Remote Key Loading (RKL)? Discover the power of our industry-leading Remote Key Loading (RKL) solution, and find out how your financial institution (FI) will benefit

More information

APG8202 PINhandy 2 OTP Generator

APG8202 PINhandy 2 OTP Generator APG8202 PINhandy 2 OTP Generator Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical

More information

Business Mobile Plans

Business Mobile Plans PRODUCT SOLUTIONS Business Mobile Plans JERSEY Whatever the size of your business, we can provide the ideal mobile solution for you. Our tariffs are flexible to suit all kinds of businesses and are designed

More information