Mobility & Security Enhancing User Experience

Size: px
Start display at page:

Download "Mobility & Security Enhancing User Experience"

Transcription

1 Mobility & Security Enhancing User Experience Giovanni Carnovale Regional Sales Manager Central Europe

2 Agenda 2

3 Core Activities How to Secure your Brand 3

4 VASCO s Core Activities User authentication Log-on access - verifying that the user is in fact who he claims to be Electronic signature Secures a transaction/message between two (known) parties Digital signature Secures a transaction/message between two parties who do not necessarily know each other, where a third party guarantees the identity/signature of all parties involved

5 Corporate Profile A leading software company, specializing in Internet security Global company with HQ in US and Europe and Operational HQ in Europe Listed on Nasdaq: VDSI Approximately 10,000 customers in 100+ countries Fast and continuous growing market share from 2004 Profitable throughout the crisis year consecutive profitable quarters allowing VASCO to finance its organic growth and acquisitions State of the art technology and products

6 3 Business Models We authenticate the world 6

7 Origins We authenticate the world 7

8 References in financial institutions We authenticate the world 8

9 References in enterprise market We authenticate the world 9

10 DIGIPASS sold & shipped DIGIPASS GO 3 DIGIPASS GO 6 DIGIPASS CertiID DIGIPASS Key 101 DIGIPASS DIGIPASS DIGIPASS 270 DIGIPASS 300 DIGIPASS 301 CV DIGIPASS GO 7 DIGIPASS GO 8 DIGIPASS GO 100 DIGIPASS Key 200 DIGIPASS Key 860 DIGIPASS 550 DIGIPASS 560 DIGIPASS 580 DIGIPASS 585 DIGIPASS 700 IPT Cloud Key Virtual DIGIPASS DIGIPASS Nano DIGIPASS for Mobile DIGIPASS 800 DIGIPASS 810 DIGIPASS 815 DIGIPASS 820 DIGIPASS 830 DIGIPASS 835 DIGIPASS for Windows DIGIPASS for Web DIGIPASS 110 DIGIPASS 836 DIGIPASS 840 CV DIGIPASS 855 DIGIPASS 865 DIGIPASS 905 DIGIPASS 920

11 Global company VASCO HQ VASCO Offices VASCO Sales Presence

12 Market Strategy 12 12

13 Banking Ecosystem ATM 13

14 Evolution of Authentication Convenience Security Time Federal Reserve Briefing 14 14

15 WW snapshot in 2FA 15

16 Regulations European Central Bank Guidance (ECB) Security of Internet Payment (Should be implemeneted by February 1st, 2015) Security of Mobile Payment (Should be implemeneted by February 1st, 2017) 1. General control of security environment Payment app data should not be accessible by other mobile apps Mobile payment app must be periodically audited Passwords and PINs must be entered in a way that cannot be compromised 2. Strong customer authentication 3. Mechanism to protect sensitive data 4. Customer awareness and education 16

17 Vasco Vision 1/3: History Security HW Client One Time Password TDS for Financial Transactions SW Client One Time Password TDS for Financial Transactions Ease RBA Fraudulent logon prevention for ebanking and Online Application Security ebanking Financial Transactions Fraud Prevention 17

18 Vasco Vision 2/3 Yesterday, balance between security, ease of use and cost Customer were concerned that too much security will downgrade usability and accessibility Security Ease Cost Our Vision is to use Security to enhance Online User experience With our Security solution User usability and accessibility is improved! 18

19 Vasco Vision 3/3 Ease HW Client Connected WYSWYS Solution (USB, BT, QR Code) Press & Login SW Client Scan & Login Scan & Sign OOB TDS Mobile Application Security Security RBA Fraudulent logon prevention for ebanking and OAS ebanking Financial Transactions Fraud Prevention 19

20 RBA New channel opportunities Channel 1 Core Banking Anti-Money Laundering: VASCO RBA integrated within the core banking system for Anti-Money Laundering and unspecified fraud prevention Channel 2 Debit and Credit Card fraud prevention: VASCO RBA integrated within the ATM and Card Scheme (Visa \ Mastercard) payment networks for fraud prevention Channel 3 ecommerce fraud prevention: VASCO RBA as a direct competitor to Cybersource often integrated as a payment gateway.. Channel 4 Card Acquiring Credit Risk monitoring: VASCO RBA integrated into card acquirers to monitor for rouge merchants who may present a significant financial exposure to the acquirer. 20

21 CrontoSign 21

22 CrontoSign Visual Transaction Signing 22

23 CrontoSign Visual Transaction Signing 23

24 Example: European Money Transfer Auto-alignment handled by device Multi-lingual 24

25 You choose Formatting Special Characters Long Message Colors Bold Customized Label Currency Special Characters Center Alignment No amount No Performance impact for long messages 25

26 Encrypted Free Text Transaction Encoding 26

27 Dynamic Personalization CrontoSign Device/Apps is distributed impersonalize Secure credentials provisioned via CrontoSign Image Update Credentials without replacing the device N No Seed Stored by Vasco 27

28 CrontoSign Business Value 1 Device to Multiple Accounts 28

29 CrontoSign Licensing Model 1 User License can be used to activate multiple Devices without any security compromise t 29

30 CrontoSign Summary Flexible Choose hardware device or mobile Easy activation CrontoSign image scanning WYSIWYS All transaction data presented on color screen Secure communication , Mail, On-line, etc. up to 115 characters 30

31 CrontoSign - Roadmap DIGIPASS 780 Device with CrontoSign technology support and touchscreen for numeric input (e.g. PIN) Rechargeable battery Release expected Q DIGIPASS 880 Card reader with CrontoSign technology support Release expected Q

32 Bluetooth-Devices 32

33 Bluetooth-Device DIGIPASS 875 Hybrid Solution, Bluetooth USB Base on Bluetooth low energy Support IOS/android/BB Support windows 8RT WYSIWYS Easy transaction data signing : 6 lines * 20 characters eid supported Device can also be used with eid to sign online contracts 33

34 Bluetooth-Device GO 3 BT One button Bluetooth device Auto discovery Unconnected Time based OTP Connected Time based OTP (BT) Online Transaction Data Signing(BT) Secure channel (128 bits) 34

35 Bluetooth-Device DIGIPASS 775 DP 770 WYSWYS BT device Touchscreen for numeric input (e.g. PIN) Rechargeable battery Coming Soon DP 340 Coming Soon 35

36 DIGIPASS for Mobile / APPS DIGIPASS for Application Perimeter Protection SDK The Mobile Security Library 36

37 Attacks against Mobile: Causes Main causes of Fraud or incidents in mobile applications in 2013 (OMASP/OWASP) Application Security Authentication 37

38 Mobile Application Security Apps are based on the same principle.. Let s secure them with all Vasco Knowledge 38

39 Client-Side Scoring

40 User Platform Context Client Side Decision Policy Client Score Policy Score Calculation Scoring: Based Authentication OTP Injection OTP Validation OTP Extraction Server Score Policy Geolocation 1 2 Action 1 Action 1 OS Version Action 2 Action 2 JailBreak & Rootkit Action 3 Action 3 Malware Action 4 Action 4 PIN Activated Action 5 Action 5 Behavior Analysis Biometric Action Action 6 Defined by customer when customizing the application, delivered within the App or with an external XML Define by customer when customizing the application, delivered within the App or with an external XML 40

41 Use Case 1 Mobile Phone is Used as an Authentication Device

42 Login Methods DIGIPASS for APPS/Mobile

43 OTP Generator OTP 43

44 Scan & Login Username Session ID SN Signature Password Scan 44

45 Transaction Data Signing Methods DIGIPASS for APPS/Mobile

46 Scan & Sign Toronto Office Supply Submit 46

47 OOB TDS Toronto Office Supply Submit 47

48 Notify & Sign 2- Send Message to Notification Service Provider 3- Deliver Notification 1- Generate Secure Channel Transaction Message 48

49 Use Case 2 Mobile Phone is Used to access Mobile Banking Application

50 Native Integration DIGIPASS for APPS

51 DIGIPASS for APPS Mobile Banlking Apps Security Increased User Friendliness. with Strong Authentication OTP 51

52 App(Banking) To App(Security) Communication DIGIPASS for Mobile

53 2 Way App To App Secure Channel Communication Digipass:// MobileBanking App:// Generat e Secure Messag e

54 Secured Cash Out DIGIPASS for APPS Sample of usage

55 ATM cash out Define Title in Insert Header/Footer Slide 55

56 VASCO Data Security Identikey Risk Management Authentication the way we do

57 A Human Scale Protocol hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 57

58 Step Up the Level of Assurance Design inspired by DryIcons hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 58

59 With plenty Pseudo Identities Design inspired by DryIcons ID NO STATE IDENTIFICATION CARD Surname Forename Address SEX M HGT 5-08 EYES BLU Student Card Forename Surname N Course 2015 FT AUTO DRIVER LICENSE Surname Forename Address SEX M HGT 5-08 EYES BLU X hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 59

60 only 1 Real Identity VASCO Data Security Assurance Level Authentication - The way we do 60

61 e-authentication beyond Yes & No Location Trends Inherence Time Environment Possession Assurance Level Knowledge Context Risk Level VASCO Data Security Authentication - The way we do 61

62 Authentication Categories Increased Trust Continuous Inherence Possession Assurance Level Knowledge VASCO Data Security Context Entity Profiling Risk Level Secondary Attributes Authentication - The way we do 62

63 4 A Value Chain Acquire Aggregate Analyze DE O K VASCO Data Security Action Authentication - The way we do 63

64 Meaningless Characteristics Analyze I Velocit y 6 Hours How many events of a certain type I N Volume 12 Hours The sum total of the value of all events N DE P Difference 24 Hours How many events holding different properties P U Same 36 hours How many events holding the same properties U T Slope 8 Hours If there is an upward or downward trend DE T VASCO Data Security Authentication - The way we do 64

65 Bayesian Model Risk? Analyze DE Self- Adjusting Historical Data probability of condition A (consequence) p(a B) = p(b A) p(a) / p(b) when condition B already exists High Risk? Probability Score Swiped Card 3% Cross Border Transactio n 20% Risk? High Decline 7% High Decline 10% Cross Border Transactio n 20% VASCO Data Security Authentication - The way we do 65

66 Artificial Neural Network Input Layer Hidden Layer Output Layer Analyze I N N P U T Perceptron DE Ibias Output Self-Learning Supervised Unsupervised Reinforcement P U T Risk? anomaly Parallel Processing VASCO Data Security Authentication - The way we do 66

67 Decision Engine Analyze Inference Score Probability Score Neural Score DE Expert Rules Velocit y 12 Hours Volume 12 Hours IO Boolean Match Same 12 hours Difference 12 Hours Memory VASCO Data Security Action Authentication - The way we do 67

68 Processing AnalyzeAcquire Batch Near Time With rollback Real Time Aggregate Analyze Trigger Authentication Review & Investigation Suspend Transaction O K VASCO Data Security Action Non-Blocking Blocking Authentication - The way we do 68

69 VASCO Vision Fraudulent logon prevention Transactions Fraud Prevention IDENTIKEY Scan & Login Scan & Sign OOB TDS Mobile Application Security Risk Manager Software Connected WYSWYS Press & Login Hardware Assurance Level Assurance Level VASCO Data Security Authentication - The way we do 69

70 Thanks!, Questions

With VASCO to the top

With VASCO to the top With VASCO to the top Roger Vandeplas Vice President World Wide Sales Agenda day 1 March 14 10.00 Registration at Hotel Metropole welcome desk 10.15 Welcome and kick-off, by Roger Vandeplas, Vice President

More information

Trending: Mobile Payments. Dan McLoughlin, VASCO Data Security Julian Sawyer, Starling Bank

Trending: Mobile Payments. Dan McLoughlin, VASCO Data Security Julian Sawyer, Starling Bank Trending: Mobile Payments Dan McLoughlin, VASCO Data Security Julian Sawyer, Starling Bank Trending: Mobile Payments Dan McLoughlin, VASCO Data Security Can banks provide a frictionless consumer experience

More information

PSD2 Compliance - Q&A

PSD2 Compliance - Q&A PSD2 Compliance - Q&A Q: How do hardware-based solutions such as OTP tokens provide dynamic linking with single transactions? In general, users can enter payment information such as the amount of money

More information

PSD2 webinar session - Q&A

PSD2 webinar session - Q&A PSD2 webinar session - Q&A Q: How does hardware based solutions such as OTP tokens will provide dynamic linking with single transactions? In general, users can enter payment information, such as the amount

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Deliver Strong Mobile App Security and the Ultimate User Experience

Deliver Strong Mobile App Security and the Ultimate User Experience Deliver Strong Mobile App Security and the Ultimate User Experience The Presenters Will LaSala, Director of Services @ VASCO Will has been with VASCO since 2001 and over the years has been involved in

More information

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Digital Identity Trends in Banking

Digital Identity Trends in Banking i-sprint Innovations Identity and Security Management Solution Provider Digital Identity Trends in Banking Banking Vietnam 2017 Proven Bank Grade Identity and Security Management Solution Designed, Architected

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

Session 2: Understanding the payment ecosystem and the issues Visa Europe

Session 2: Understanding the payment ecosystem and the issues Visa Europe Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

Account Takeover: Why Payment Fraud Protection is Not Enough

Account Takeover: Why Payment Fraud Protection is Not Enough Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest

More information

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Authentication and Fraud Detection Buyer s Guide

Authentication and Fraud Detection Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Protecting Against Online Fraud. F5 EMEA Webinar August 2014 Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

PCI Compliance Updates

PCI Compliance Updates PCI Compliance Updates PCI Mobile Payment Acceptance Security Guidelines Adam Goslin, Chief Operations Officer AGoslin@HighBitSecurity.com Direct: 248.388.4328 PCI Guidance February, 2013 - PCI Mobile

More information

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.

More information

Taking a Risk-Based Authentication Approach to Financial Fraud Protection

Taking a Risk-Based Authentication Approach to Financial Fraud Protection Taking a Risk-Based Authentication Approach to Financial Fraud Protection By David Strom Copyright 2014 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in

More information

FFIEC Guidance: Mobile Financial Services

FFIEC Guidance: Mobile Financial Services FFIEC Guidance: Mobile Financial Services Written by: Jon Waldman, CISA, CRISC Partner and Senior Information Security Consultant Secure Banking Solutions, LLC FFIEC Updates IT Examination Handbook to

More information

PSD2: Risks, Opportunities and New Horizons

PSD2: Risks, Opportunities and New Horizons PSD2: Risks, Opportunities and New Horizons Contents 02 Timeline 3 April, 2014 Parliamentary plenary session 23 July, 2014 Further compromise text 14 October, 2014 Further compromise text 31 December,

More information

The PCI Security Standards Council

The PCI Security Standards Council The PCI Security Standards Council 2/29/2008 Agenda The PCI SSC Roles and Responsibilities How To Get Involved PCI SSC Vendor Programs PCI SSC Standards PCI DSS Version 1.1 Revised SAQ 2/29/2008 2 The

More information

Straight2Bank Approver User Guide

Straight2Bank Approver User Guide Straight2Bank Approver User Guide Last Updated: March 2015 Table of Contents PURPOSE... 3 1. UNDERSTANDING TRANSACTION AUTHORISATION... 4 1.1. OVERVIEW... 4 1.2. VASCO TOKEN... 4 1.3. AVAILABILITY & CONTROL...

More information

How Ezio ebanking Solutions help banks comply with PSD2

How Ezio ebanking Solutions help banks comply with PSD2 How Ezio ebanking Solutions help banks comply with PSD2 Are you ready for PSD2? TABLE OF CONTENTS Executive Summary 3 The Revised Payment Services Directive (PSD2) 4 Key milestone 5 Drivers for the change

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

Deutsche Bank Global Transaction Banking. Digipass 270XH. Getting 4 Started.

Deutsche Bank Global Transaction Banking. Digipass 270XH. Getting 4 Started. Deutsche Bank Global Transaction Banking Digipass 270XH Getting 4 Started www.db.com Contents 1. What is a Digipass 270XH 3 2. Prepare your Digipass 4 3. Log-in 5 4. Authorisation with your Digipass 7

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

6 Vulnerabilities of the Retail Payment Ecosystem

6 Vulnerabilities of the Retail Payment Ecosystem 6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

Prepaid Access MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014

Prepaid Access MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014 Prepaid Access 2014 MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014 Discussion Points Emerging Technology Prepaid Access What is it and how does it work? Open

More information

Think big, think Brazil

Think big, think Brazil Think big, think Brazil Expand in Brazil and around the world confidently, with Worldpay GLOBAL ACQUIRING - BRAZIL Brazil an exciting emerging ecommerce market With a population of 209.5 million1 and a

More information

More than just being signed-in or signed-out. Parul Jain, Architect,

More than just being signed-in or signed-out. Parul Jain, Architect, More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance

More information

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN Trusted Identities Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN WHAT YOU WILL LEARN TODAY Strong identity verification as a security measure and business enabler Authentication

More information

Deutsche Bank Global Transaction Banking. Digipass 270/276XH. Getting 4 Started.

Deutsche Bank Global Transaction Banking. Digipass 270/276XH. Getting 4 Started. Deutsche Bank Global Transaction Banking Digipass 270/276XH Getting 4 Started www.db.com Contents 1. What is a Digipass 270/276XH 3 2. Prepare your Digipass 4 3. Log-in 5 4. Authorisation with your Digipass

More information

SxS Authentication solution. - SXS

SxS Authentication solution. - SXS SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet

More information

CoreFirst Bank & Trust

CoreFirst Bank & Trust CoreFirst Bank & Trust New Commercial Internet Banking Frequently Asked Questions ACCOUNT OVERVIEW 1. Q: Why are some of my account numbers highlighted and marked with an asterisk A: Highlighted account

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

paladin vendor report 2017

paladin vendor report 2017 paladin vendor report 2017 Introduction At Paladin Group, we re deeply immersed in the fraud solution landscape. It s our day-to-day work to understand the latest solution providers, services, and tools.

More information

New Paradigms of Digital Identity:

New Paradigms of Digital Identity: A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

User Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android

User Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android Disclosure Statements Confidential Notice The information contained herein is the property of Total System Services, Inc. (TSYS

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

June 2013 PCI DSS COMPLIANCE GUIDE. Look out for the tips in the blue boxes if you use Fetch TM payment solutions.

June 2013 PCI DSS COMPLIANCE GUIDE. Look out for the tips in the blue boxes if you use Fetch TM payment solutions. If your business processes Visa and MasterCard debit or credit card transactions, you need to have Payment Card Industry Data Security Standard (PCI DSS) compliance. We understand that PCI DSS requirements

More information

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become

More information

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social

More information

Dell One Identity Cloud Access Manager 8.0. Overview

Dell One Identity Cloud Access Manager 8.0. Overview Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Team One Mobile Banking App DETAILED ENHANCEMENTS

Team One Mobile Banking App DETAILED ENHANCEMENTS Team One Mobile Banking App DETAILED ENHANCEMENTS Team One Mobile Banking App DETAILED ENHANCEMENTS Table of Contents Page Touch ID 3 QuickBalance 4 MiSnap 6 Bill Pay Enhancement 6 AnyWhereMobile Set Up

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

ANZ FASTPAY USER GUIDE

ANZ FASTPAY USER GUIDE ANZ FASTPAY USER GUIDE WELCOME TO YOUR ANZ FASTPAY USER GUIDE CONTENTS What you need to set up ANZ FastPay 2 What s in your ANZ FastPay box? 2 Where else to find help and information 3 Get to know your

More information

About MagTek. PIN Entry & Management

About MagTek. PIN Entry & Management About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

Card Issuance/Encoding & PIN Pads

Card Issuance/Encoding & PIN Pads Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,

More information

Invisible Mobile Banking Channel Security

Invisible Mobile Banking Channel Security Invisible Mobile Banking Channel Security Table of Contents Introduction 1 A brief review of today s evolving threat landscape 2 Understanding RASP 3 Acquiring information to make the best security decisions

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

PIN Entry & Management

PIN Entry & Management PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance

More information

OptiSol FinTech Platforms

OptiSol FinTech Platforms OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India

More information

How to secure your mobile application with RASP

How to secure your mobile application with RASP How to secure your mobile application with RASP Webinar - 13 December 2016 Agenda 1. Mobile Application Security Risk categories Protection layers including RASP Dirk Denayer Enterprise & Application Security

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Nelnet Enterprise Student Account Online Billing and Payment System. Undergraduate Student User Guide

Nelnet Enterprise Student Account Online Billing and Payment System. Undergraduate Student User Guide Nelnet Enterprise Student Account Online Billing and Payment System Undergraduate Student User Guide Student Access You may access Nelnet Enterprise by logging on to your Secure Hollins HIS account at

More information

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information

More information

SIAM R3.0 USER GUIDE

SIAM R3.0 USER GUIDE SIAM R3.0 USER GUIDE Document Reference: 8295 September 2016 Revision: 3 Version Date Author Changes Number 1 Mar 2015 John Lindsay 2 Jun Sam Unsuspending a SIM card description updated. 2016 Smith 3 Sep

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013. Publishing Enterprise Web Applications to BYOD using a Granular Trust Model Shachaf Levi IT Client Security & Connectivity May 2013 Public Legal Notices This presentation is for informational purposes

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

2016 ConCardis GmbH. Fraud Detection Module (basic)

2016 ConCardis GmbH. Fraud Detection Module (basic) Fraud Detection Module (basic) Table of contents 1. Introduction 1.1 Benefits 1.2 Contents 2. Activation and configuration 2.1 Blocking rules 2.1.1 Card country 2.1.2 IP address country 2.1.3 Country consistency

More information

Challenges and. Opportunities. MSPs are Facing in Security

Challenges and. Opportunities. MSPs are Facing in Security Challenges and Opportunities MSPs are Facing in 2017 Security MSPs work in an environment that is constantly changing for both the needs of customers and the technology in which they provide. Fanning the

More information

Securing Your Salesforce Org: The Human Factor. February 2016 User Group Meeting

Securing Your Salesforce Org: The Human Factor. February 2016 User Group Meeting Securing Your Salesforce Org: The Human Factor February 2016 User Group Meeting Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

CardValet. Where can CardValet be downloaded? The CardValet application is available on the Apple App Store and Google Play Store.

CardValet. Where can CardValet be downloaded? The CardValet application is available on the Apple App Store and Google Play Store. What is CardValet? SWACU Cardholders use CardValet to: Turn your SWACU debit card on and off. CardValet Set locations establishing where the card can be used. (These do not override blocked countries)

More information

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller

More information

PSD2 Gateway Solution Overview

PSD2 Gateway Solution Overview 1 PSD2 Gateway PSD2 Gateway Solution Overview 4 th September 2017 PURPOSE OF THE DOCUMENT PSD2 Gateway is a small team of Fintech experts, developing a standard API solution to fulfil the PSD2 regulation

More information

CyberSource Global Payment Management

CyberSource Global Payment Management CyberSource Global Payment Management Magento 2.x Implementation Guide Version 1.1.0 August 2017 Extract Use this guide to install and configure the CyberSource extension for Magento 2.x. Contents Recent

More information

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services

More information

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels The Devil is in the Details: The Secrets to Complying with PCI Requirements Michelle Kaiser Bray Faegre Baker Daniels 1 PCI DSS: What? PCI DSS = Payment Card Industry Data Security Standard Payment card

More information

VASCO Data Security International, Inc. NASDAQ: VDSI

VASCO Data Security International, Inc. NASDAQ: VDSI VASCO Data Security International, Inc. NASDAQ: VDSI Senior Analyst: Zayda Romero Junior Analysts: Jackson Feder, Karan Mehra, Karen Rodriguez, Nick Tanabe, Smeet Patel 1 Agenda Recommendation Summary

More information

Using Security to Lock in Commercial Banking Customers

Using Security to Lock in Commercial Banking Customers EXECUTIVE SUMMARY Webinar Using Security to Lock in Commercial Banking Customers Commercial banking is a market opportunity that financial institutions (FIs) should not ignore. Tens of billions of dollars

More information

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

PCI compliance the what and the why Executing through excellence

PCI compliance the what and the why Executing through excellence PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?

More information

ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview

ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview February 10, 2011 Quick Overview RSM McGladrey, Inc. Greg Schu, Managing Director/Partner Kelly Hughes, Director When considered with

More information

PRIVACY STATEMENT OF TIBBAA SMARTCARD

PRIVACY STATEMENT OF TIBBAA SMARTCARD PRIVACY STATEMENT OF TIBBAA SMARTCARD 1. PERSONAL USE OF DATA 2. TS INFORMATION COLLECTED AND USED 3. INFORMATION ACCESSED BY TS FROM THIRD PARTIES 4. INFORMATION COLLECTED ON WEBSITES 5. INFORMATION OF

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

PCI COMPLIANCE IS NO LONGER OPTIONAL

PCI COMPLIANCE IS NO LONGER OPTIONAL PCI COMPLIANCE IS NO LONGER OPTIONAL YOUR PARTICIPATION IS MANDATORY To protect the data security of your business and your customers, the credit card industry introduced uniform Payment Card Industry

More information