Securing Identities in the Cloud: Simple Methods, Satisfied Customers VASCO Data Security
|
|
- Jody Stafford
- 5 years ago
- Views:
Transcription
1 Securing Identities in the Cloud: Simple Methods, Satisfied Customers Michael O Malley VP Marketing November 2013
2 Increasing need to protect our online activities End users ASP s Confidential data leakage Cyber bullying Gold farming Identity theft Lost revenues Tarnished brand Low data integrity Subscriber churn 2012: Hackers able to access users personal data for use in phishing attacks 2012: Hacker able to access billing information and other accounts 2012: Exposed 6 million user account passwords 2013: Hackers posted fake news about bombing of the White House, Dow Jones dropped 100 points 2013: 10 million people watch Netflix without paying for it by sharing passwords 2013: Hackers able to access customer names, credit/debit cards and expiration dates of 2.9 million customers, and up to 38 million ID s and passwords 2
3 Agenda Applications and pain points Cloud services Subscription services Gaming Quick VASCO background Sample business case Sample competitive comparison 3
4 Cloud Security Concerns Losing files Files not stored securely Loss of control Embarrassing files made public Computer viruses Source: Halon 2013 Security Survey 4
5 Cloud Providers Are Expected to Lead on Security Within five years, cloud security will become one of the primary drivers for adopting cloud computing. The reason for a shift of security from obstacle to driver is that Cloud Service Providers (CSPs) are expected to invest far more in the development of their security infrastructure and expertise than any typical enterprise Ernst and Young: Cloud Computing Issues and Impacts,
6 Subscription Sharing: New York Times Analysis BuzzFeed: It is representative of a rising generation of young people who 1) Like watching shows Online and 2) Cannot fathom paying for them 6
7 Subscription Account Sharing Impacts Eliminate revenue leakage from account sharing Account sharing is perceived as a back-end security problem. But for companies that rely on online subscriptions as a primary revenue stream, account sharing can mean lost income What we found was that about 33 percent of the accounts on the network were being shared Secure personal information Preserve data integrity for advertising/marketing "If you're running The Wall Street Journal or World of Warcraft, and you've got multiple people sharing a single subscription, you're losing customers." Source: AdmitOne 7
8 Tier 1 ASP Example Company Profile One of the world's largest insight, information and consultancy networks. By connecting its specialist companies, the group aims to become the pre-eminent provider of compelling insights for the global business community. Needs Protect online assets/revenues and control their IP Auditable and traceable accounts for Risk and Compliance Dept. No new overhead or code modification of existing web portals OpEx based purchases to tie to subscription services and improve cash flow Everything IT must move to the cloud In need of a cloud based two-factor authentication platform 8
9 Current state of Gaming Online gaming industry growing significantly....however ARPU is steadily declining $20.0 $18.0 $16.0 $14.0 $12.0 $10.0 $8.0 $6.0 $4.0 $2.0 $ Online Gaming Market Share by Geography (USD $B) ROW US Publishers need assistance to stabilize ARPU by providing additional value to paying customers Source: SuperData Research and Newzoo Games 9
10 US Gaming Demographics 117m Online Gamers in the US Affinity to online security Typical US Gamer Age Income $35k-$75k 60% male 79% college degree 1. Above average income and education 2. Tech savvy 3. Understand the value of security Sources: *Nielsen Entertainment's third annual Active Gamer Benchmark Study; ** StatGrab; ***SuperData Research/Newzoo 10
11 Gaming companies must capitalize on hits Example: Diablo 3 Fastest selling PC game to date Broke Amazon record for most preorders Sold 3.5m copies on the 1 st day Sold 6m copies in 1 st week Within 1 week, it became the most played game in Korea, 39% of Korean gamers logging in daily Securing new game revenue is a natural fit 11
12 Gaming ASP Pain Points Account sharing Increase revenues and subscriptions with stronger authentication New releases are very competitive, must capitalize on hits Account bullying Hackers stealing credentials to tamper with account holders Gold farming Dissatisfaction lowers switching costs and increases churn Less of an issue with advent of free to play and ability to buy/sell with real dollars User islands Create communities of users to increase stickiness and monetize free to play Cross sell gaming assets One credential to access all game sites MMO players are very dedicated gamers. As the majority already plays games on other screens, it will be interesting to see if publishers succeed in extending and monetizing their MMO experience across all screens. Peter Warman, CEO of Newzoo 12
13 Secure Portal to Web Apps App1 App2 Numerous Logins Passwords App3 QR code scan App4 Cloud Subscribers IPT OTP App5 App6 Complex Simple for for users, savings headache for IT for helpdesk IT helpdesk 13 13
14 Our Philosophy Security Ease Cost Find the optimal balance for ASPs and consumers Federal Reserve Briefing 14
15 VASCO Heritage in Banking Security 15
16 Cost Effective Cloud Cost per user Opex Model Pay as you grow Users or Authentications 16
17 MYDIGIPASS.COM Subscription Business Case ASP with 1M users per month Increased Subscription Assumptions: 20,000,000 Per a Tier 1 subscription account, 2FA will increase revenues by 10% in YR 1 increasing to 20% by YR 5 $100 annual subscription revenue $10 per user 2FA cost 16,000,000 12,000,000 Incremental revenues Incremental costs 8,000,000 4,000,000 - YR 1 YR 2 YR 3 YR 4 YR 5 MDP.com would return $17.5M net profit over 5 years. 17
18 Easily Deployed Two Factor Authentication 18
19 Spying on SMS Home Grown SMS Your unique code is w2z356 Your unique code is w2z356 Secure out of band QR code transmission Unsecure text message can be intercepted using off the shelf software 19
20 Top Things to Remember for ASP s Are you creating a secure cloud community? Application Delivery Is account vulnerability limiting your revenue growth? Losing potential customers High cost of fixing account hacking events Causing customer churn Could strong two-factor authentication in the cloud meet your needs? Speedy ROI Easy to manage / Easy for users More secure than SMS 20
21 For More Information Visit us at For Application Service Providers For End Users 21
Transform your video services with a cloud platform: Succeed in a fragmented marketplace
with a cloud platform: Succeed in a fragmented marketplace Contents 3 4 7 cloud-based platform 8 10 12 14 16 points: Great in action 18 : Your business faces a significant challenge. Subscriber demands
More informationCapital Markets Seminar Hendrik Klindworth, Founder & CEO
Capital Markets Seminar 2017 Hendrik Klindworth, Founder & CEO COMPANY SNAPSHOT Founded 2007 In Germany 420 employees in two offices Located in Hamburg & Düsseldorf 200m registered users >30 language versions
More informationSecurity Solutions for Mobile Users in the Workplace
Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationMavenir Spam and Fraud Control
SOLUTION BRIEF Assuring Operator Revenue and A2P Grey Route Monetization Operators are realizing the scale and potential of A2P (Application to Person) messaging revenues, and how advances in messaging
More informationAnnual General Meeting.
Annual General Meeting. 2018 Peter James Chairman 20th November 2018 Macquarie Telecom Group 3 Key Business Highlights. 6% 19% 20% 19% Revenue $233.1m EBITDA $47.8m NPAT $17.0m EPS 80.9cps Eight consecutive
More informationAnnual General Meeting.
Annual General Meeting. 2016. 18 November 2016 Our people. Macquarie Telecom Group 3 Chairman s Address. Peter James. 2016. 4 Key Business Highlights. 5% 23% 223% 223% Revenue $202.6m EBITDA $32.3m NPAT
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationHow. Biometrics. Expand the Reach of Mobile Banking ENTER
How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication
More informationCLOUD COMPUTING PRIMER
CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS
More informationDNA Plc January-March 2018 Interim Report
DNA Plc January-March 2018 Interim Report 19 April, 2018 Jukka Leinonen, CEO Timo Karppinen, CFO Forward looking statement This presentation contains, or may be deemed to contain, statements that are not
More informationThe most extensive identity protection plan available
The most extensive identity protection plan available AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A Sharing data is now a fact of daily life. Our work requires personal
More informationSAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0
SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0 TABLE OF CONTENTS 1 INTRODUCTION...3 2 BENEFITS...4 3 FUNCTIONAL DESCRIPTION...5 4 MESSAGE CLASSIFICATION...6 5 ARCHITECTURE...7
More informationChallenges and. Opportunities. MSPs are Facing in Security
Challenges and Opportunities MSPs are Facing in 2017 Security MSPs work in an environment that is constantly changing for both the needs of customers and the technology in which they provide. Fanning the
More informationHalf Year Results February 2017
Half Year Results. 2017. 27 February 2017 CEO Presentation. 3 Our Brands. For business, we are the full service provider of data, voice, mobile and colocation services. We are the telecom that does everything
More informationCreating a TV- Anywhere Platform
Creating a TV- Anywhere Platform 2012 Business Overview The demand for smartphones, handheld multimedia devices and tablets is at an all time high, with Google and Apple battling for market share by launching
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationWhitepaper on AuthShield Two Factor Authentication with SAP
Whitepaper on AuthShield Two Factor Authentication with SAP By AuthShield Labs Pvt. Ltd Table of Contents Table of Contents...2 1.Overview...4 2. Threats to account passwords...5 2.1 Social Engineering
More information2017 USER SURVEY EXECUTIVE SUMMARY
2017 USER SURVEY EXECUTIVE SUMMARY INTRODUCTION Survey methodology 2017 NODE.JS USER SURVEY The primary objective of the research was to profile Node.js users, understand usage patterns and trends and
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationCopyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Lynn Anderson Senior Vice President, Communications Chief Communications Officer Chief of Staff Bill Veghte Chief Operating Officer, HP Lynn Anderson Senior Vice President, Communications Chief Communications
More informationVonage Digital Phone Service 2010 Annual Report
Vonage Digital Phone Service 2010 Annual Report 1 Our Mission Contents 2010 was a year of accomplishment. The dramatic improvement in our performance is a direct result of the focused efforts of our dedicated
More informationSOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications
Enabling and Securing Digital Business in Economy Protect s Serving Business Critical Applications 40 percent of the world s web applications will use an interface Most enterprises today rely on customers
More informationExpanding Your Services: Reach, Engage, Measure, & Monetize. Eric Freund VP, Product Marketing
Expanding Your Services: Reach, Engage, Measure, & Monetize Eric Freund VP, Product Marketing $Billions Minerva Responding to Rising Content Costs & Competition $10 $9 $8 Broadcast Retransmission Fee Projections
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationWHITE PAPER QUINCY100
UINCY100 TM 1 WHITE PAPER People often ask me if I built the index, I did not. Our experts did. But I can tell you this, I've been in the industry for over 0 years and I've witnessed it transform. Things
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationWelcome! Today s program
Game of Phones Mobile Consumer Survey 18 October 2016 Welcome! Today s program Hour Item 08.00-08.10 Introductory remarks by on behalf of the Aga Khan University, Graduate School of Media and Communications
More informationIABM OTT Conference. Hassan Ghoul, IABM MEA Director
IABM OTT Conference Hassan Ghoul, IABM MEA Director Agenda 10:00 Welcome and update from NAB by IABM s Hassan Ghoul, Director MEA 10:25 Artificial Intelligence & Machine Learning applied to OTT Ali Amazouz,
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationThe 5G consumer business case. An economic study of enhanced mobile broadband
The 5G consumer business case An economic study of enhanced mobile broadband Enhancing today s services for tomorrow 5G has the potential to drive new revenue streams. Much focus has been on the innovative
More informationPhone-Based One-Time Password without Proofing (Level 2) User Guide November 2017
Phone-Based One-Time Password without Proofing (Level 2) User Guide November 2017 1 Contents About Phone Based One-Time Password... 3 OTP Acquisition and Activation Process Overview... 3 Step 1: Determine
More informationSECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION
SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating
More informationCloud Revenue Streams
Cloud Revenue Streams Not All Cloud Platforms Are Created Equal Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction Cloud computing is creating new ways for businesses to outsource
More informationOperator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea
Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator
More informationmhealth SECURITY: STATS AND SOLUTIONS
mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported
More informationHow Cyber-Criminals Steal and Profit from your Data
How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity
More informationVideo Game Security. Carter Jones
Video Game Security Carter Jones Overview Industry overview Risks Business Technical Attack & Defense Thick client Network Industry comparisons Conclusion whoami Senior security consultant @ Cigital Previously
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationFive Reasons It s Time For Secure Single Sign-On
Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide
More informationForward Looking Statement
Forward Looking Statement This presentation contains forward-looking statements which are statements that refer to expectations and plans for the future and include, without limitation, statements regarding
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationPhishing in the Age of SaaS
Phishing in the Age of SaaS AN ESSENTIAL GUIDE FOR BUSINESSES AND USERS The Cloud Security Platform Q3 2017 intro Phishing attacks have become the primary hacking method used against organizations. In
More informationBSkyB Sky Go Extra SVOD Service
Customer Case Study BSkyB Sky Go Extra SVOD Service Premium Multiscreen Service EXECUTIVE SUMMARY COMPANY OVERVIEW Customer Name: BSkyB Industry: Telecommunications Location: United Kingdom, Ireland BUSINESS
More informationHalf Year Results th February 2018
Half Year Results. 2018. 27 th February 2018 2 Key Business Highlights. Seven consecutive halves of revenue and profit growth EBITDA CAGR of 24.0% over the last 3 years Improved operational leverage and
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationRelated Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)
PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the
More informationTHE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015
THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT 2 EXECUTIVE SUMMARY The growth of enterprise-developed applications has made it easier for businesses to use technology to work more efficiently and productively.
More informationSession 2: Understanding the payment ecosystem and the issues Visa Europe
Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said
More information2017 SaaS Security Study ABSTRACT
2017 SaaS Security Study ABSTRACT Data security is a key element of selecting any SaaS provider. Qualtrics surveyed over 200 SaaS security and privacy officers to understand which security and privacy
More informationFuture of Digital Home Entertainment
Future of Digital Home Entertainment This report analyzes trends, technologies and business models of the enablers and providers of digital content. It examines six meta-themes that can be used as a template
More informationThe State of the App Economy
The State of the App Economy Retrospective 2016 & Insights 2017 Thierry Guiot Southern Europe Territory Director Baptiste Carrère Business Development Manager Southern Europe We help build better app businesses
More informationApple Watch A Threat or Opportunity for the Swatch? Presenting to: Nick Hayek, Owner and CEO of Swatch Group Ltd. Montreal, January 2, 2016
Apple Watch A Threat or Opportunity for the Swatch? Presenting to: Nick Hayek, Owner and CEO of Swatch Group Ltd. Montreal, January 2, 2016 Driving Question How to face the new and disruptive smartwatch
More informationSDN AT THE SPEED OF BUSINESS THE NEW AUTONOMOUS PARADIGM FOR SERVICE PROVIDERS FAST-PATH TO INNOVATIVE, PROFITABLE SERVICES
SDN AT THE SPEED OF BUSINESS THE NEW AUTONOMOUS PARADIGM FOR SERVICE PROVIDERS FAST-PATH TO INNOVATIVE, PROFITABLE SERVICES Software-Defined Expectations & Preparations for the Smart Network Transformation
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationOdin. SMB Cloud InsightsTM GERMANY
Odin 2015 SMB Cloud InsightsTM GERMANY DEFINITIONS SMB Defined We define SMBs also known as small and medium enterprises (SMEs) as companies with one to 250 employees. There are around 2 million SMBs in
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More informationA STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017
A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More information2010 Online Banking Security Survey:
2010 Online Banking Security Survey: ZeuS-Like Malware Rapidly Outpaces All Other Online Banking Threats PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536
More informationMaking the Promise of IPTV A Reality in Small Markets
S T R A T E G I C W H I T E P A P E R Making the Promise of IPTV A Reality in Small Markets Taking the first step towards multi-screen services to increase revenue, improve customer satisfaction and reduce
More informationDATA CENTER COLOCATION BUILD VS. BUY
DATA CENTER COLOCATION BUILD VS. BUY Comparing the total cost of ownership of building your own data center vs. buying third-party colocation services Executive Summary As businesses grow, the need for
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationkakao May 2018 Investor Relations
kakao May 2018 Investor Relations Disclaimer Financial information contained in this document is based on consolidated K-IFRS that have not been reviewed by an independent auditor: therefore, the information
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cyber security, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationHardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)
SESSION ID: CSV-F01 Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) Aaron McKeown Lead Security Architect Xero Fast or Secure Fast
More informationClouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services
Clouds in the Forecast Factors to Consider for In-House vs. Cloud-Based Systems and Services Speakers Sam Gabal Sam Gabal is a Sales Executive with Origami Risk, based in Orange County and experienced
More informationSafaricom Ltd FY 2012 Presentation
Safaricom Ltd FY 2012 Presentation Disclaimer The following presentation is being made only to, and is only directed at, persons to whom such presentations may lawfully be communicated ( relevant persons
More informationConnect & take control
Connect & take control RealVNC invented VNC screen sharing technology over twenty years ago. We deliver secure screen sharing for a wide range of industry applications on all major computer and mobile
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationBuilding a Profitable Data Future. Monetizing Data Traffic
Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,
More informationGFI has tens of thousands of customers worldwide and distribution is served by a 10,000-strong Channel.
Who We Are GFI: Overview GFI is a multinational software development company providing enterprise-quality solutions that enable businesses to discover, manage and secure their networks GFI has tens of
More informationEnterprise and Wholesale
Enterprise and Wholesale Ron Spears Group President-Global Business Services AT&T Inc. Cautionary Language Concerning Forward-Looking Statements Information set forth in these presentations contains financial
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationCisco Enterprise Agreement
PSODGT-1076 Cisco Enterprise Agreement John Marshall, Global Director: Cisco Enterprise Agreement strategy Vinay Nichani, WW Software Sales Cisco Spark How Questions? Use Cisco Spark to communicate with
More informationInnovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience
Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience Rich Bolstridge Chief Strategist, Financial Services Akamai Technologies Agenda Who uses Akamai in Financial
More informationAgenda Business Overview Operating Results Financial Results
1 Agenda 2001 Business Overview 2001 Operating Results 2001 Financial Results 2 2001 Business Overview Satisfactory Operating Performance New Businesses Taking-off Increasingly Efficient Operations Promising
More informationSAFARICOM LIMITED ANNOUNCES AUDITED RESULTS FOR THE YEAR ENDED 31 MARCH 2016.
SAFARICOM LIMITED ANNOUNCES AUDITED RESULTS FOR THE YEAR ENDED 31 MARCH 2016. KEY HIGHLIGHTS Delivering on strategy continues to grow our revenues with continued significance in non-voice revenues Service
More informationFIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON
FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON W HI T E P A P ER TABLE OF CONTENTS 03 04 06 06 07 08 09 10 10 EXECUTIVE OVERVIEW INTRODUCTION IMPROVING CUSTOMER ENGAGEMENT IS ON YOUR CMO S RADAR BYOD
More informationTrusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN
Trusted Identities Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN WHAT YOU WILL LEARN TODAY Strong identity verification as a security measure and business enabler Authentication
More informationFFIEC Guidance: Mobile Financial Services
FFIEC Guidance: Mobile Financial Services Written by: Jon Waldman, CISA, CRISC Partner and Senior Information Security Consultant Secure Banking Solutions, LLC FFIEC Updates IT Examination Handbook to
More informationExploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA
Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users
More informationModernizing Servers and Software
SMB PLANNING GUIDE Modernizing Servers and Software Increase Performance with Intel Xeon Processor E3 v3 Family Servers and Windows Server* 2012 R2 Software Why You Should Read This Document This planning
More informationCONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President
CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers
More informationVulnerabilities in online banking applications
Vulnerabilities in online banking applications 2019 Contents Introduction... 2 Executive summary... 2 Trends... 2 Overall statistics... 3 Comparison of in-house and off-the-shelf applications... 6 Comparison
More informationUBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO
UBS 42 nd Annual Global Media and Communications Conference December 8, 2014 Leigh Fox, CFO Safe Harbor This presentation and the documents incorporated by reference herein contain forward-looking statements
More information2006 Interim Results. China Telecom Corporation Limited 30 August 2006
2006 Interim Results China Telecom Corporation Limited www.chinatelecom-h.com 30 August 2006 Forward-Looking Statements Certain statements contained in this document may be viewed as forwardlooking statements
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationCompany Presentation. August 2013
Company Presentation August 2013 1 Untapped User Base India: One of the Largest Consumer Economies India : 4th Largest Economy Globally GDP (PPP) : US$ 4.8 Tn GDP at Purchasing Power Parity in 2012 US$
More informationTim Cohn TimWCohn
Tim Cohn www.marketingprinciples.com 1-866-TimWCohn How To Get More Leads, Prospects and Sales Without Hiring New Employees or Going Broke! The Only 3 Ways To Grow Your Business Increase the number of
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More information4Q 2015 Earnings Conference Call. February 26, 2016
4Q 2015 Earnings Conference Call February 26, 2016 Safe Harbor Statement This presentation includes forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of
More information