Mobility & Security Enhancing User Experience
|
|
- Rachel Kennedy
- 5 years ago
- Views:
Transcription
1 Mobility & Security Enhancing User Experience Giovanni Carnovale Regional Sales Manager Central Europe
2 Agenda 2
3 Core Activities How to Secure your Brand 3
4 VASCO s Core Activities User authentication Log-on access - verifying that the user is in fact who he claims to be Electronic signature Secures a transaction/message between two (known) parties Digital signature Secures a transaction/message between two parties who do not necessarily know each other, where a third party guarantees the identity/signature of all parties involved
5 Corporate Profile A leading software company, specializing in Internet security Global company with HQ in US and Europe and Operational HQ in Europe Listed on Nasdaq: VDSI Approximately 10,000 customers in 100+ countries Fast and continuous growing market share from 2004 Profitable throughout the crisis year consecutive profitable quarters allowing VASCO to finance its organic growth and acquisitions State of the art technology and products
6 3 Business Models We authenticate the world 6
7 Origins We authenticate the world 7
8 References in financial institutions We authenticate the world 8
9 References in enterprise market We authenticate the world 9
10 DIGIPASS sold & shipped DIGIPASS GO 3 DIGIPASS GO 6 DIGIPASS CertiID DIGIPASS Key 101 DIGIPASS DIGIPASS DIGIPASS 270 DIGIPASS 300 DIGIPASS 301 CV DIGIPASS GO 7 DIGIPASS GO 8 DIGIPASS GO 100 DIGIPASS Key 200 DIGIPASS Key 860 DIGIPASS 550 DIGIPASS 560 DIGIPASS 580 DIGIPASS 585 DIGIPASS 700 IPT Cloud Key Virtual DIGIPASS DIGIPASS Nano DIGIPASS for Mobile DIGIPASS 800 DIGIPASS 810 DIGIPASS 815 DIGIPASS 820 DIGIPASS 830 DIGIPASS 835 DIGIPASS for Windows DIGIPASS for Web DIGIPASS 110 DIGIPASS 836 DIGIPASS 840 CV DIGIPASS 855 DIGIPASS 865 DIGIPASS 905 DIGIPASS 920
11 Global company VASCO HQ VASCO Offices VASCO Sales Presence
12 Market Strategy 12 12
13 Banking Ecosystem ATM 13
14 Evolution of Authentication Convenience Security Time Federal Reserve Briefing 14 14
15 WW snapshot in 2FA 15
16 Regulations European Central Bank Guidance (ECB) Security of Internet Payment (Should be implemeneted by February 1st, 2015) Security of Mobile Payment (Should be implemeneted by February 1st, 2017) 1. General control of security environment Payment app data should not be accessible by other mobile apps Mobile payment app must be periodically audited Passwords and PINs must be entered in a way that cannot be compromised 2. Strong customer authentication 3. Mechanism to protect sensitive data 4. Customer awareness and education 16
17 Vasco Vision 1/3: History Security HW Client One Time Password TDS for Financial Transactions SW Client One Time Password TDS for Financial Transactions Ease RBA Fraudulent logon prevention for ebanking and Online Application Security ebanking Financial Transactions Fraud Prevention 17
18 Vasco Vision 2/3 Yesterday, balance between security, ease of use and cost Customer were concerned that too much security will downgrade usability and accessibility Security Ease Cost Our Vision is to use Security to enhance Online User experience With our Security solution User usability and accessibility is improved! 18
19 Vasco Vision 3/3 Ease HW Client Connected WYSWYS Solution (USB, BT, QR Code) Press & Login SW Client Scan & Login Scan & Sign OOB TDS Mobile Application Security Security RBA Fraudulent logon prevention for ebanking and OAS ebanking Financial Transactions Fraud Prevention 19
20 RBA New channel opportunities Channel 1 Core Banking Anti-Money Laundering: VASCO RBA integrated within the core banking system for Anti-Money Laundering and unspecified fraud prevention Channel 2 Debit and Credit Card fraud prevention: VASCO RBA integrated within the ATM and Card Scheme (Visa \ Mastercard) payment networks for fraud prevention Channel 3 ecommerce fraud prevention: VASCO RBA as a direct competitor to Cybersource often integrated as a payment gateway.. Channel 4 Card Acquiring Credit Risk monitoring: VASCO RBA integrated into card acquirers to monitor for rouge merchants who may present a significant financial exposure to the acquirer. 20
21 CrontoSign 21
22 CrontoSign Visual Transaction Signing 22
23 CrontoSign Visual Transaction Signing 23
24 Example: European Money Transfer Auto-alignment handled by device Multi-lingual 24
25 You choose Formatting Special Characters Long Message Colors Bold Customized Label Currency Special Characters Center Alignment No amount No Performance impact for long messages 25
26 Encrypted Free Text Transaction Encoding 26
27 Dynamic Personalization CrontoSign Device/Apps is distributed impersonalize Secure credentials provisioned via CrontoSign Image Update Credentials without replacing the device N No Seed Stored by Vasco 27
28 CrontoSign Business Value 1 Device to Multiple Accounts 28
29 CrontoSign Licensing Model 1 User License can be used to activate multiple Devices without any security compromise t 29
30 CrontoSign Summary Flexible Choose hardware device or mobile Easy activation CrontoSign image scanning WYSIWYS All transaction data presented on color screen Secure communication , Mail, On-line, etc. up to 115 characters 30
31 CrontoSign - Roadmap DIGIPASS 780 Device with CrontoSign technology support and touchscreen for numeric input (e.g. PIN) Rechargeable battery Release expected Q DIGIPASS 880 Card reader with CrontoSign technology support Release expected Q
32 Bluetooth-Devices 32
33 Bluetooth-Device DIGIPASS 875 Hybrid Solution, Bluetooth USB Base on Bluetooth low energy Support IOS/android/BB Support windows 8RT WYSIWYS Easy transaction data signing : 6 lines * 20 characters eid supported Device can also be used with eid to sign online contracts 33
34 Bluetooth-Device GO 3 BT One button Bluetooth device Auto discovery Unconnected Time based OTP Connected Time based OTP (BT) Online Transaction Data Signing(BT) Secure channel (128 bits) 34
35 Bluetooth-Device DIGIPASS 775 DP 770 WYSWYS BT device Touchscreen for numeric input (e.g. PIN) Rechargeable battery Coming Soon DP 340 Coming Soon 35
36 DIGIPASS for Mobile / APPS DIGIPASS for Application Perimeter Protection SDK The Mobile Security Library 36
37 Attacks against Mobile: Causes Main causes of Fraud or incidents in mobile applications in 2013 (OMASP/OWASP) Application Security Authentication 37
38 Mobile Application Security Apps are based on the same principle.. Let s secure them with all Vasco Knowledge 38
39 Client-Side Scoring
40 User Platform Context Client Side Decision Policy Client Score Policy Score Calculation Scoring: Based Authentication OTP Injection OTP Validation OTP Extraction Server Score Policy Geolocation 1 2 Action 1 Action 1 OS Version Action 2 Action 2 JailBreak & Rootkit Action 3 Action 3 Malware Action 4 Action 4 PIN Activated Action 5 Action 5 Behavior Analysis Biometric Action Action 6 Defined by customer when customizing the application, delivered within the App or with an external XML Define by customer when customizing the application, delivered within the App or with an external XML 40
41 Use Case 1 Mobile Phone is Used as an Authentication Device
42 Login Methods DIGIPASS for APPS/Mobile
43 OTP Generator OTP 43
44 Scan & Login Username Session ID SN Signature Password Scan 44
45 Transaction Data Signing Methods DIGIPASS for APPS/Mobile
46 Scan & Sign Toronto Office Supply Submit 46
47 OOB TDS Toronto Office Supply Submit 47
48 Notify & Sign 2- Send Message to Notification Service Provider 3- Deliver Notification 1- Generate Secure Channel Transaction Message 48
49 Use Case 2 Mobile Phone is Used to access Mobile Banking Application
50 Native Integration DIGIPASS for APPS
51 DIGIPASS for APPS Mobile Banlking Apps Security Increased User Friendliness. with Strong Authentication OTP 51
52 App(Banking) To App(Security) Communication DIGIPASS for Mobile
53 2 Way App To App Secure Channel Communication Digipass:// MobileBanking App:// Generat e Secure Messag e
54 Secured Cash Out DIGIPASS for APPS Sample of usage
55 ATM cash out Define Title in Insert Header/Footer Slide 55
56 VASCO Data Security Identikey Risk Management Authentication the way we do
57 A Human Scale Protocol hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 57
58 Step Up the Level of Assurance Design inspired by DryIcons hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 58
59 With plenty Pseudo Identities Design inspired by DryIcons ID NO STATE IDENTIFICATION CARD Surname Forename Address SEX M HGT 5-08 EYES BLU Student Card Forename Surname N Course 2015 FT AUTO DRIVER LICENSE Surname Forename Address SEX M HGT 5-08 EYES BLU X hi there! I am VASCO Data Security Assurance Level Authentication - The way we do 59
60 only 1 Real Identity VASCO Data Security Assurance Level Authentication - The way we do 60
61 e-authentication beyond Yes & No Location Trends Inherence Time Environment Possession Assurance Level Knowledge Context Risk Level VASCO Data Security Authentication - The way we do 61
62 Authentication Categories Increased Trust Continuous Inherence Possession Assurance Level Knowledge VASCO Data Security Context Entity Profiling Risk Level Secondary Attributes Authentication - The way we do 62
63 4 A Value Chain Acquire Aggregate Analyze DE O K VASCO Data Security Action Authentication - The way we do 63
64 Meaningless Characteristics Analyze I Velocit y 6 Hours How many events of a certain type I N Volume 12 Hours The sum total of the value of all events N DE P Difference 24 Hours How many events holding different properties P U Same 36 hours How many events holding the same properties U T Slope 8 Hours If there is an upward or downward trend DE T VASCO Data Security Authentication - The way we do 64
65 Bayesian Model Risk? Analyze DE Self- Adjusting Historical Data probability of condition A (consequence) p(a B) = p(b A) p(a) / p(b) when condition B already exists High Risk? Probability Score Swiped Card 3% Cross Border Transactio n 20% Risk? High Decline 7% High Decline 10% Cross Border Transactio n 20% VASCO Data Security Authentication - The way we do 65
66 Artificial Neural Network Input Layer Hidden Layer Output Layer Analyze I N N P U T Perceptron DE Ibias Output Self-Learning Supervised Unsupervised Reinforcement P U T Risk? anomaly Parallel Processing VASCO Data Security Authentication - The way we do 66
67 Decision Engine Analyze Inference Score Probability Score Neural Score DE Expert Rules Velocit y 12 Hours Volume 12 Hours IO Boolean Match Same 12 hours Difference 12 Hours Memory VASCO Data Security Action Authentication - The way we do 67
68 Processing AnalyzeAcquire Batch Near Time With rollback Real Time Aggregate Analyze Trigger Authentication Review & Investigation Suspend Transaction O K VASCO Data Security Action Non-Blocking Blocking Authentication - The way we do 68
69 VASCO Vision Fraudulent logon prevention Transactions Fraud Prevention IDENTIKEY Scan & Login Scan & Sign OOB TDS Mobile Application Security Risk Manager Software Connected WYSWYS Press & Login Hardware Assurance Level Assurance Level VASCO Data Security Authentication - The way we do 69
70 Thanks!, Questions
With VASCO to the top
With VASCO to the top Roger Vandeplas Vice President World Wide Sales Agenda day 1 March 14 10.00 Registration at Hotel Metropole welcome desk 10.15 Welcome and kick-off, by Roger Vandeplas, Vice President
More informationTrending: Mobile Payments. Dan McLoughlin, VASCO Data Security Julian Sawyer, Starling Bank
Trending: Mobile Payments Dan McLoughlin, VASCO Data Security Julian Sawyer, Starling Bank Trending: Mobile Payments Dan McLoughlin, VASCO Data Security Can banks provide a frictionless consumer experience
More informationPSD2 Compliance - Q&A
PSD2 Compliance - Q&A Q: How do hardware-based solutions such as OTP tokens provide dynamic linking with single transactions? In general, users can enter payment information such as the amount of money
More informationPSD2 webinar session - Q&A
PSD2 webinar session - Q&A Q: How does hardware based solutions such as OTP tokens will provide dynamic linking with single transactions? In general, users can enter payment information, such as the amount
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationDeliver Strong Mobile App Security and the Ultimate User Experience
Deliver Strong Mobile App Security and the Ultimate User Experience The Presenters Will LaSala, Director of Services @ VASCO Will has been with VASCO since 2001 and over the years has been involved in
More informationGiovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security
Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationA Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services
A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationDigital Identity Trends in Banking
i-sprint Innovations Identity and Security Management Solution Provider Digital Identity Trends in Banking Banking Vietnam 2017 Proven Bank Grade Identity and Security Management Solution Designed, Architected
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationSession 2: Understanding the payment ecosystem and the issues Visa Europe
Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said
More informationWhite Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security
White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:
More informationAccount Takeover: Why Payment Fraud Protection is Not Enough
Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest
More informationVisa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations
Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationUniversity of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director
More informationUser Authentication Best Practices for E-Signatures Wednesday February 25, 2015
User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationAuthentication and Fraud Detection Buyer s Guide
Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered
More informationProtecting Against Online Fraud. F5 EMEA Webinar August 2014
Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture
More informationPCI Compliance Updates
PCI Compliance Updates PCI Mobile Payment Acceptance Security Guidelines Adam Goslin, Chief Operations Officer AGoslin@HighBitSecurity.com Direct: 248.388.4328 PCI Guidance February, 2013 - PCI Mobile
More informationINNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY
INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.
More informationTaking a Risk-Based Authentication Approach to Financial Fraud Protection
Taking a Risk-Based Authentication Approach to Financial Fraud Protection By David Strom Copyright 2014 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in
More informationFFIEC Guidance: Mobile Financial Services
FFIEC Guidance: Mobile Financial Services Written by: Jon Waldman, CISA, CRISC Partner and Senior Information Security Consultant Secure Banking Solutions, LLC FFIEC Updates IT Examination Handbook to
More informationPSD2: Risks, Opportunities and New Horizons
PSD2: Risks, Opportunities and New Horizons Contents 02 Timeline 3 April, 2014 Parliamentary plenary session 23 July, 2014 Further compromise text 14 October, 2014 Further compromise text 31 December,
More informationThe PCI Security Standards Council
The PCI Security Standards Council 2/29/2008 Agenda The PCI SSC Roles and Responsibilities How To Get Involved PCI SSC Vendor Programs PCI SSC Standards PCI DSS Version 1.1 Revised SAQ 2/29/2008 2 The
More informationStraight2Bank Approver User Guide
Straight2Bank Approver User Guide Last Updated: March 2015 Table of Contents PURPOSE... 3 1. UNDERSTANDING TRANSACTION AUTHORISATION... 4 1.1. OVERVIEW... 4 1.2. VASCO TOKEN... 4 1.3. AVAILABILITY & CONTROL...
More informationHow Ezio ebanking Solutions help banks comply with PSD2
How Ezio ebanking Solutions help banks comply with PSD2 Are you ready for PSD2? TABLE OF CONTENTS Executive Summary 3 The Revised Payment Services Directive (PSD2) 4 Key milestone 5 Drivers for the change
More informationSafelayer's Adaptive Authentication: Increased security through context information
1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient
More informationA Step By Step Guide To Use PayPal
A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking
More informationDeutsche Bank Global Transaction Banking. Digipass 270XH. Getting 4 Started.
Deutsche Bank Global Transaction Banking Digipass 270XH Getting 4 Started www.db.com Contents 1. What is a Digipass 270XH 3 2. Prepare your Digipass 4 3. Log-in 5 4. Authorisation with your Digipass 7
More informationUsing Biometric Authentication to Elevate Enterprise Security
Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of
More information6 Vulnerabilities of the Retail Payment Ecosystem
6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting
More informationPro s and con s Why pins # s, passwords, smart cards and tokens fail
Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an
More informationPrepaid Access MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014
Prepaid Access 2014 MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014 Discussion Points Emerging Technology Prepaid Access What is it and how does it work? Open
More informationThink big, think Brazil
Think big, think Brazil Expand in Brazil and around the world confidently, with Worldpay GLOBAL ACQUIRING - BRAZIL Brazil an exciting emerging ecommerce market With a population of 209.5 million1 and a
More informationMore than just being signed-in or signed-out. Parul Jain, Architect,
More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance
More informationTrusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN
Trusted Identities Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN WHAT YOU WILL LEARN TODAY Strong identity verification as a security measure and business enabler Authentication
More informationDeutsche Bank Global Transaction Banking. Digipass 270/276XH. Getting 4 Started.
Deutsche Bank Global Transaction Banking Digipass 270/276XH Getting 4 Started www.db.com Contents 1. What is a Digipass 270/276XH 3 2. Prepare your Digipass 4 3. Log-in 5 4. Authorisation with your Digipass
More informationSxS Authentication solution. - SXS
SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet
More informationCoreFirst Bank & Trust
CoreFirst Bank & Trust New Commercial Internet Banking Frequently Asked Questions ACCOUNT OVERVIEW 1. Q: Why are some of my account numbers highlighted and marked with an asterisk A: Highlighted account
More informationHow technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011
How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationpaladin vendor report 2017
paladin vendor report 2017 Introduction At Paladin Group, we re deeply immersed in the fraud solution landscape. It s our day-to-day work to understand the latest solution providers, services, and tools.
More informationNew Paradigms of Digital Identity:
A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationUser Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android
mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android Disclosure Statements Confidential Notice The information contained herein is the property of Total System Services, Inc. (TSYS
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card
More informationCitizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development
Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software
More informationJune 2013 PCI DSS COMPLIANCE GUIDE. Look out for the tips in the blue boxes if you use Fetch TM payment solutions.
If your business processes Visa and MasterCard debit or credit card transactions, you need to have Payment Card Industry Data Security Standard (PCI DSS) compliance. We understand that PCI DSS requirements
More informationA Practical Step-by-Step Guide to Managing Cloud Access in your Organization
GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become
More informationIT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager
IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social
More informationDell One Identity Cloud Access Manager 8.0. Overview
Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationTeam One Mobile Banking App DETAILED ENHANCEMENTS
Team One Mobile Banking App DETAILED ENHANCEMENTS Team One Mobile Banking App DETAILED ENHANCEMENTS Table of Contents Page Touch ID 3 QuickBalance 4 MiSnap 6 Bill Pay Enhancement 6 AnyWhereMobile Set Up
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationANZ FASTPAY USER GUIDE
ANZ FASTPAY USER GUIDE WELCOME TO YOUR ANZ FASTPAY USER GUIDE CONTENTS What you need to set up ANZ FastPay 2 What s in your ANZ FastPay box? 2 Where else to find help and information 3 Get to know your
More informationAbout MagTek. PIN Entry & Management
About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification
More informationSecuring today s identity and transaction systems:! What you need to know! about two-factor authentication!
Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationCard Issuance/Encoding & PIN Pads
Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,
More informationInvisible Mobile Banking Channel Security
Invisible Mobile Banking Channel Security Table of Contents Introduction 1 A brief review of today s evolving threat landscape 2 Understanding RASP 3 Acquiring information to make the best security decisions
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationPIN Entry & Management
PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance
More informationOptiSol FinTech Platforms
OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India
More informationHow to secure your mobile application with RASP
How to secure your mobile application with RASP Webinar - 13 December 2016 Agenda 1. Mobile Application Security Risk categories Protection layers including RASP Dirk Denayer Enterprise & Application Security
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationThe BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO
The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612
More informationNelnet Enterprise Student Account Online Billing and Payment System. Undergraduate Student User Guide
Nelnet Enterprise Student Account Online Billing and Payment System Undergraduate Student User Guide Student Access You may access Nelnet Enterprise by logging on to your Secure Hollins HIS account at
More informationDIGIPASS Authentication to Citrix XenDesktop with endpoint protection
DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information
More informationSIAM R3.0 USER GUIDE
SIAM R3.0 USER GUIDE Document Reference: 8295 September 2016 Revision: 3 Version Date Author Changes Number 1 Mar 2015 John Lindsay 2 Jun Sam Unsuspending a SIM card description updated. 2016 Smith 3 Sep
More informationSECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION
SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating
More informationPublishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.
Publishing Enterprise Web Applications to BYOD using a Granular Trust Model Shachaf Levi IT Client Security & Connectivity May 2013 Public Legal Notices This presentation is for informational purposes
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More information2016 ConCardis GmbH. Fraud Detection Module (basic)
Fraud Detection Module (basic) Table of contents 1. Introduction 1.1 Benefits 1.2 Contents 2. Activation and configuration 2.1 Blocking rules 2.1.1 Card country 2.1.2 IP address country 2.1.3 Country consistency
More informationChallenges and. Opportunities. MSPs are Facing in Security
Challenges and Opportunities MSPs are Facing in 2017 Security MSPs work in an environment that is constantly changing for both the needs of customers and the technology in which they provide. Fanning the
More informationSecuring Your Salesforce Org: The Human Factor. February 2016 User Group Meeting
Securing Your Salesforce Org: The Human Factor February 2016 User Group Meeting Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain
More informationWHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?
WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.
More informationCardValet. Where can CardValet be downloaded? The CardValet application is available on the Apple App Store and Google Play Store.
What is CardValet? SWACU Cardholders use CardValet to: Turn your SWACU debit card on and off. CardValet Set locations establishing where the card can be used. (These do not override blocked countries)
More informationAUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response
AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller
More informationPSD2 Gateway Solution Overview
1 PSD2 Gateway PSD2 Gateway Solution Overview 4 th September 2017 PURPOSE OF THE DOCUMENT PSD2 Gateway is a small team of Fintech experts, developing a standard API solution to fulfil the PSD2 regulation
More informationCyberSource Global Payment Management
CyberSource Global Payment Management Magento 2.x Implementation Guide Version 1.1.0 August 2017 Extract Use this guide to install and configure the CyberSource extension for Magento 2.x. Contents Recent
More informationAuthentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair
Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services
More informationThe Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels
The Devil is in the Details: The Secrets to Complying with PCI Requirements Michelle Kaiser Bray Faegre Baker Daniels 1 PCI DSS: What? PCI DSS = Payment Card Industry Data Security Standard Payment card
More informationVASCO Data Security International, Inc. NASDAQ: VDSI
VASCO Data Security International, Inc. NASDAQ: VDSI Senior Analyst: Zayda Romero Junior Analysts: Jackson Feder, Karan Mehra, Karen Rodriguez, Nick Tanabe, Smeet Patel 1 Agenda Recommendation Summary
More informationUsing Security to Lock in Commercial Banking Customers
EXECUTIVE SUMMARY Webinar Using Security to Lock in Commercial Banking Customers Commercial banking is a market opportunity that financial institutions (FIs) should not ignore. Tens of billions of dollars
More informationBiometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way
Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationPCI compliance the what and the why Executing through excellence
PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?
More informationISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview
ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview February 10, 2011 Quick Overview RSM McGladrey, Inc. Greg Schu, Managing Director/Partner Kelly Hughes, Director When considered with
More informationPRIVACY STATEMENT OF TIBBAA SMARTCARD
PRIVACY STATEMENT OF TIBBAA SMARTCARD 1. PERSONAL USE OF DATA 2. TS INFORMATION COLLECTED AND USED 3. INFORMATION ACCESSED BY TS FROM THIRD PARTIES 4. INFORMATION COLLECTED ON WEBSITES 5. INFORMATION OF
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture
More informationPCI COMPLIANCE IS NO LONGER OPTIONAL
PCI COMPLIANCE IS NO LONGER OPTIONAL YOUR PARTICIPATION IS MANDATORY To protect the data security of your business and your customers, the credit card industry introduced uniform Payment Card Industry
More information