KOBIL worldwide secure online banking. Take the challenge anytime, anywhere
|
|
- Amber Bradford
- 6 years ago
- Views:
Transcription
1 KOBIL worldwide secure online banking Take the challenge anytime, anywhere
2 KOBIL stands for secure data and secure communication on any computer in the world. Whether it is for business or private use, KOBIL offers optimal protection for every online workplace and also makes e-banking an easy and comfortable process. Our vision is simple: a secure workplace now and in the future. The market leader in the technology sector sets new standards with its hardware and software products, and is considered a trend setter with its midentity, the smallest bank branch in the world, measuring just 16.9 cm². KOBIL products are future-proof and, thanks to their upgradeability, are always at the cutting edge of development. E-banking solutions powered by KOBIL - these are solutions that offer clear added value to the end customer. The three product lines midentity, SecOVID (One Time Password) and smart card terminals are revenue drivers that open up new business models for the banking industry. KOBIL technology is used by numerous companies such as Deutsche Telekom, Swisscom, Arcor/Vodafone, T-Systems, DATEV, Commerzbank, UBS, Migros Bank, Rothschild Bank, YapıKredi and Isbank as well as the German Parliament, and the German Federal Office for Information Security (BSI). Our vision: a secure workplace now and in the future
3 We at KOBIL take pride in taking on the greatest challenges in product development: to make online banking mobile, user-friendly and highly secure. That is why we always need to stay one step ahead of the game, offering products that make innovative security technology ready for hands-on applications in every day life. We live up to this challenge every day. With more than 23 years of experience in the areas of cryptography, smart card and PKI technology, KOBIL counts among the pioneers of highly secure online banking. Our all-round solutions stand for secure and easy e-banking, making legally binding bank transactions possible worldwide and as safe as in your local bank branch. Welcome fringe benefits of deploying this groundbreaking technology include your cross-selling opportunities and customer loyalty. Hardware and software components that render e-banking authentic and highly secure for a long time are the result of our drive for innovation. Bank Full service solutions for secure online banking
4 UBS Commerzbank YapıKredi MIGROS BANK swisscom Deutsche Vermögensberatung IBM SIEMENS FUJITSU-SIEMENS Deutsche Telekom T-Online T-Systems T-TeleSec Route1 Hypo Vereinsbank Vodafone bank-verlag köln VOLKSWOHL BUND BADENIA DG VERLAG Deutscher Sparkassen Verlag UniCredit Bundes- amt für Sicherheit in der Informationstechnik The great success of our products has made us a reliable partner to many well-known companies from around the world. Bundesnetzagentur McAfee RWE Basler Versicherungen DATEV TÜRKİYE İŞ BANKASI T.C. Ziraat Bankası ING Akbank Koç Grup Worldwide satisfied customers
5 Automatic secure updates for software and firmware The ideal customer retention tool due to the many crossselling opportunities it offers Non-install and portable smart card applications midentity Docking, steady go: midentity enables user authentication, electronic signature and encryption of s, thus making it a state-of-the art mobile solution for online banking. The common challenge of conducting banking transactions online just as secure and convenient as you would in your local bank branch is a thing of the past: All necessary software you need to conduct secure online transactions is already stored on board of midentity you simply have to plug it into the USB port of any web-enabled computer. Online banking without any installation on any Windows, MacOS and Linux computer Fraud protection through hardened applications on board of midentity Longtime protection of your investment thanks to our secure update service Highly secure communication due to the application of digital signatures Convenient usage through easy plug & play installation Easy adaption to changes in infrastructure Replaceable smart cards provide an enormously long product life cycle Fully interoperable with existing standards and specifications Your portable freedom
6 midentity fullsize Completely mobile and running on MacOS, Linux and Windows Continue using your existing smart card in a convenient way with our high security technology. KOBIL midentity fullsize is based on the same technology as midentity except that as a bank customer, you can now use it with your regular bank card. Your existing bank card combined with midentity full size provides ideal security in online banking. User friendly through the usage of full size smart cards Support of full size cards (ISO format) Support of MacOS, Linux and Windows Update service for both firmware and software Easy usage through plug & play Hardened applications on board Anonymous card production system Device management system User mapping Easy plug & play installation with a USB-cable Full size full security
7 Keypad for convenient key entry what you see is what you sign midentity visual S/L future-proof technology for full size and SIM-sized smart cards Backlight display for improved visibility midentity visual S / L What you see is what you sign this slogan best describes the main advantage of KOBIL midentity visual. Internet attacks increase every day and users often do not know if their original transactions have been modified by the time they sign them. This problem is solved by midentity visual because it has a display on which your entered data can be verified before signing. What you see is high security. WYSIWYS (What you see is what you sign) High contrast display Easy-to-use keypad Usable with full size smart cards and SIM-sized smart cards Support of MacOS, Linux, Windows Hardened browser and other applications already on board Secure updates for firmware and software Very high level of security and convenience Anonymous card production Zero footprint for smart card applications What you see is what you sign
8 Smart card technology at the price of OTP technology midentity Token midentity token is the cost-effective alternative to OTP technology offering highest security and mobility levels through the use of a smart card. Longtime protection of your investment as well as ideal customer loyalty are guaranteed by our secure update service, which keeps your token at the cutting edge of development. Non-install smart card applications Automatic firmware updates Portable banking without any installation on any Windows, MacOS or Linux computer Longtime protection of investment thanks to our secure update service Convenient and easy usage through plug & play Exchangeable smart cards provide an enormously long life cycle Support of international standards for quick implementation Zero footprint for smart card applications The smart start
9 Backlight display for improved visibility midentity Token visual S/L Future-proof technology for full size and sim-sized smart cards midentity Token visual S / L What you see is what you sign this slogan best describes the main advantage of KOBIL midentity visual. Internet attacks increase every day and users often do not know if their original transactions have been modified by the time they sign them. This problem is solved by midentity visual because it has a display on which your entered data can be verified before signing. What you see is high security. midentity token visual is the cost-effective alternative to midentity visual. Keypad for convenient key entry what you see is what you sign Exchangeable smart card full size cards and SIM-sized cards Data display for the verification of information Key pad for convenient data entry Portable banking without any installation on any Windows, MacOS or Linux computer Convenient and easy usage through plug & play Secure update service for firmware and software Central access management Identity management Device management Easy rollout mechanism Just secure - what else
10 Large and logically consistent arrangement of keys for error-free code entry Large, high-contrast display for improved visibility DSA-Technology optical interface for easy & secure data communication CAP Optimus comfort The CAP Optimus comfort reader is the latest innovation by KOBIL. Your bank card along with CAP Optimus comfort and any web-enabled PC will be all you need for secure and easy online communication. This well-designed device has integrated optical sensors on the back allowing to read the flickering code displayed on your PC screen to generate your TAN highest online security made by KOBIL. Easy-to-read display Large and easy-to-use keypad Best ergonomics (Lego compliant) Easily replaceable batteries Colored keypad Convenient use in upright format Multilingual (English, German, Turkish) Exellent transfer-detection due to DSA technology Elegance combined with perfect ergonomics
11 Large, high-contrast display for improved visibility KOBIL SecOPTIC We upgraded our well-established OTP technology by yet another technological highlight. The KOBIL SecOPTIC token is equipped with a display as well as a keypad and optical interface for what you see is what you sign. KOBIL SecOPTIC is designed for the convenient use of online banking. Keypad for easy signing - What you see is what you sign Optical interface Display and keypad Cost-effective alternative to smart card readers Replaceable battery High level of security and convenience Easy integration in IT infrastructure Reducing helpdesk costs DSA-Technology optical interface supports easy & secure data communication Advanced security technology
12 Event-synchronous technology You get it when you need it High cost-effectiveness Permanent usability of token through replaceable batteries KOBIL SecOVID Token SecOVID is the product line by KOBIL closing the security gap caused by static, reusable passwords in online banking environments once and for all. This easy way of authentication is independent of the client as well as the software and operating system on the PC. Highly secure access to an online banking platform guarantees longtime customer loyalty. Smooth integration into existing environments through the support of international standards such as Radius or OATH High performance server Unlimited scalability Centralized and simple management of user data Interoperability with third party providers High mobility for the user due to a small token (size of a key ring) OATH version available A simple way of security
13 Automatic secure update for firmware Usage of online and offline functions with one device Runs without any installation on Windows, MAC OS and Linux computers EMV TriCAP Users are on the safe side using this compact and attractive smart card terminal for electronic business. The EMV TriCAP makes PIN interception through viruses or trojans impossible because your data is entered not via the PC, but via the integrated device keypad. Thus, the EMV-CAP Reader contributes in an essential way to enhancing the security and confidentiality in the electronic world. Secure firmware updates for flexible customization in response to new requirements Large, easy-to-handle keypad for secure PIN entry Compatibility with all common standards, including EMV-CAP (connected & unconnected reader) Comprehensive driver support Durable material Online/offline operation Collapsible USB docking station for online operation Common Criteria EAL3+ certified Compliant with German signature law Alphanumerical display for authentic messages Get more of your smart card
14 HTTPS (SOAP) secure your smart security management With the midentity smart security server you can manage your midentity devices all over the world thanks to new technologies like smart spdate, smart check and Existing customer Infrastructure Server Bank KOBIL smart security management Identity Management. midentity combines security when updating software and firmware with a considerable reduction of support costs and guarantees your flexibility and security for the next five years. HTTPS (Browser) Administrator, HelpDesk etc. smart security management
15 M-IDentity enhances security for customers of Migrosbank Due to the continuously rising number of phishing attacks and other cyber crime on the Internet, Migrosbank as the first bank in Switzerland offers their M-BankcNet customers a new technology to carry out e-banking transactions M-IDentity. M-IDentity impresses with both high security and high user convenience. Moreover, the technology is easy to use and completely mobile. Since customers do not have to install any software on the computer, they can insert their USB drive into any PC to access M-BancNet. This innovative system was developed by the German IT security provider KOBIL Systems with headquarters in Worms, Germany. Best of: Free of charge for all customers of Migrosbank Hardened browser on board Secure updates for firmware and software Java on board Adapts to changes in infrastructure Intelligent management system Relaceable smart card Digital signature enabled The next generation in payment transactions If inserted into the USB port of any web-enabled computer, midentity will lead you to the login page of your payment transactions application within Commerzbank s corporate banking portal. There is no need to enter URLs and the system works independent of the software equipment of the host computer because midentity already has its own browser on board. Thanks to automatic updates, midentity is always equipped with the latest software and firmware. With this new technology, accessing your bank account has never been easier all you have to do is to enter your user number and PIN. Furthermore, your electronic signature is stored safely on midentity and protected with a personal password. Your digital signature authorizes your payment transactions without any additional effort or data entry anytime and practically everywhere. Best of: Your accounts at Commerzbank as well as accounts at other banks can be managed jointly Mass transactions and scheduled payments can be conducted effortlessly Account information can also be retrieved from other banks Transactions can be managed worldwide in an easy way Direct access and authorization Distributed digital signature Flexible allocation of rights Trust is good - references are better
16 KOBIL midentity / midentity Fullsize midentity Token/ visual S / visual L midentity visual S/ visual L EMV TriCAP CAP Optimus comfort KOBIL SecOVID Token/ SecOPTIC The midentity is a USB-based device using a smart card to ensure highly secure and convenient communication while protecting data from thirdparty access, much in the manner of a safe. Therefore, the hardware characteristics of midentity provide global mobility and permanent security for your data and applications without any installation. Security combined with userfriendliness are the main concerns of KOBIL. All the user needs to do is to plug in midentity into the USB port of any given PC. That s it. Retail banking customers often see themselves confronted with the issue of having to choose between high user convenience or high security in online banking. midentity token, however, is a portable smart card terminal offering all the security and mobility a user may need at the lowest price you can imagine. Due to the replaceable smart card and update technology of midentity token, your investment is protected longtime. What you see is what you sign. This slogan describes the main advantage of KOBIL midentity visual. Internet attacks are increasing day by day and users often do not know if they signed their transactions as they typed in before. This problem is solved by our technology. Because you can read the transaction data on the display of midentity visual and can exactly sign this information. What you see is highsecurity. As a user, you will be on the safe side using this compact and attractive smart card terminal for your electronic business applications. What is more, the EMV-CAP reader makes PIN interception through viruses or trojans impossible because your data is not entered via the PC, but via the integrated device keypad. Thus, the EMV TriCAP contributes in an essential way to enhancing the security and confidentiality in the electronic world. The reader can be used online and offline for EMV-CAP applications and is Common Criteria certified. This innovative optical reader offers more security and convenience in online and home banking. It reads the flickering code on the PC screen through its optical sensors on the back. The transaction data is transferred simply by holding your reader in front of the PC screen. This way the procedure offers an effective protection against phishing and other methods of data theft. Self explaining symbols, a trilingual user menu, ideal ergonomics and easy to replace batteries an intelligent and practical solution, made by KOBIL. Forgetting your static password is a good way to start it is the start of higher security. What is even better is to have a billion passwords which you do not even know yourself. This is the concept of the SecOVID system. At the touch of a button, the KOBIL Sec- OVID token calculates a numerical one time password from more than one billion possible combinations, displays it on the screen and instantly forgets it as soon as the application is closed. For more information: KOBIL Systems GmbH Fon: Fax: info@kobil.com Web: KOBIL: full service solutions
midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible
KOBIL Mobile, Secure and Flexible KOBIL is the ideal product for the mobile, yet safe transportation of your data and the protection of your digital identity. The perfectly integrated smartcard technology
More informationAPG8201 PINHandy
APG8201 PINHandy Units 2010-2013, 20th Floor Chevalier Commercial Centre 8 Wang Hoi Road, Kowloon Bay, HK Tel: +852-27967873 Fax: +852-27961286 info@acs.com.hk www.acs.com.hk Outline 1. Product Overview
More informationSmart Payments. Generating a seamless experience in a digital world.
Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,
More informationCOMMUNICATION SERVER INTEGRAL 55 LX
IP Telephony Contact Centers Mobility Services OVERVIEW COMMUNICATION SERVER INTEGRAL 55 LX As a leading supplier of communication systems and services, Avaya designs, builds and manages communication
More informationCard Issuance/Encoding & PIN Pads
Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,
More informationSecurity Solutions for Mobile Users in the Workplace
Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationMoser Baer Group 25 years of excellence
Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets
More informationUse Digipass two-factor authentication
DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass
More informationCryptoEx: Applications for Encryption and Digital Signature
CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server
More informationSagem Orga Strong, Global, Innovative.
Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence
More informationDisplay Cards for Securing E Commerce
Display Cards for Securing E Commerce Don Malloy Business Development Manager 10th February 2012 Salt Lake City Nagra Kudelski Group Activity Lines Group Revenue 2010 : USD 1.1B Physical access solutions
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationepass FIDO -NFC PRODUCT MANUAL
epass FIDO -NFC PRODUCT MANUAL V1.3 2017-03 FEITIAN Technologies Co., Ltd. Website: www.ftsafe.com Overview Feitian epass FIDO -NFC is a FIDO alliance certified U2F authentication key. Unlike the traditional
More informationSxS Authentication solution. - SXS
SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet
More informationSystem to assure authentication and transaction security. Presentation of the concept and product May 2009
System to assure authentication and transaction security Presentation of the concept and product May 2009 AXSionics AG, Neumarktstrasse 27, 2503 Biel, Switzerland Information: Dr. Lorenz Müller Lorenz.mueller@axsionics.ch
More informationGiovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security
Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate
More informationAPG8201 PINhandy 1. Technical Specifications. Subject to change without prior notice
APG8201 PINhandy 1 Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical Specifications...
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationAsseco SEE Authentication Solutions. ASEBA SxS, ASEBA Mobile Token
Asseco SEE Authentication Solutions ASEBA SxS, ASEBA Mobile Token Robert Mihaljek Sales Professional September, 2012. Sofia, Bulgaria Agenda About Asseco Threaths User authentication options Our Solution
More informationThe secure remote support, remote access and online meeting software that the world relies on.
The secure remote support, remote access and online meeting software that the world relies on. TeamViewer, the market leader activated by users on 1.3 billion devices worldwide. The Right Solution for
More informationOATH : An Initiative for Open AuTHentication
OATH : An Initiative for Open AuTHentication Who Are You Really Doing Business With? 2 Oath Proprietary Confidential The New York Magazine, July 5, 1993, Peter Steiner, The Economic Promise of e-business
More informationECOS SECURE BOOT STICK
ECOS SECURE BOOT STICK Highly Secure Access to Data and Applications Highly secure Budget-friendly All on one stick Remote Data Access Easy, Flexible, Highly Secure Public authorities, institutions and
More informationLinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!
LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable
More informationNext Level Remote Access
Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationNEVIS Smart Solutions against sophisticated attackers
NEVIS Smart Solutions against sophisticated attackers Stephan Schweizer NEVIS Product Manager March 2016 1 AdNovum at a Glance Enterprise-scale software and security solutions Founded in 1988, privately
More informationThe Gemalto offer for PKI market in Russia
The Gemalto offer for PKI market in Russia Miroslaw TOCICKI, Technical Consultant September 18th, 2014 Agenda Introduction Gemalto IdA portfolio Java PKI cards for developers GOST certified solution IDPrime
More informationUtimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,
More informationThe Real Time IP System for medium-sized up to very large enterprises. HiPath
The Real Time IP System for medium-sized up to very large enterprises HiPath 4000 www.siemens.com/hipath As a successful company, you know how important communication is for your business. Regardless of
More informationIdentity and Authentication PKI Portfolio
Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime
More informationSecure and simple authentication via mobile phone.
Secure and simple authentication via mobile phone. Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it easier
More informationSecurity Solutions. End-to-end security. Protecting your physical access control system.
Security Solutions End-to-end security Protecting your physical access control system. www.nedapsecurity.com security common practice Bringing IT best practices to physical security Often, companies don
More informationNETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY.
NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY. MACMON MODULE & BUNDLES DEVELOPMENT It is macmon s mission to improve and further develop its products. Exciting extensions are currently being worked
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture
More informationAPG8202 PINhandy 2 OTP Generator
APG8202 PINhandy 2 OTP Generator Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationSecure Card Reading and PIN Solutions
Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek
More informationMarkus Bartsch. German Smart Metering and European Privacy Needs
Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationINNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY
INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.
More informationACR38U PocketMate. Smart Card Reader. Technical Specifications. Subject to change without prior notice
ACR38U PocketMate Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Ingenious Design... 3 1.3.
More informationOptical Disc Libraries. No compromises. Put your trust in the new generation of data storage!
Optical Disc Libraries No compromises. Put your trust in the new generation of data storage! Reliable data storage is not a question of convenience. It is protection and security for the future. Time for
More informationACR89 Handheld Smart Card Reader Technical Specifications. Datenblatt / Specifications
Datenblatt / Specifications ACR89 Handheld Smart Card Reader Technical Specifications idvation GmbH Otto-Hesse-Straße 19 / T5 Phone +49 6151 9926567 D-64293 Darmstadt Fax +49 6151 3689296 info@idvation.com
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationArchitecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions
SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports
More informationIs Your Online Bank Really Secure?
Is Your Online Bank Really Secure? Zoltan Szalai / ebanking Solution Manager April 25, 2013 2 Gemalto for You ONE THIRD OF THE WORLD S POPULATION USE OUR SOLUTIONS EVERYDAY BANKS & RETAIL TELECOM TRANSPORT
More informationSmart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security
Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services
More informationCitiDirect BE Portal Security, technical requirements and configuration
CitiDirect BE Portal Security, technical requirements and configuration CitiService CitiDirect BE Helpdesk tel. 801 343 978, +48 22 690 15 21 Monday to Friday; 8:00 17:00 helpdesk.ebs@citi.com www.citihandlowy.pl
More informationWELCOME TO DIGIALGO WHO WE ARE? WHAT WE DO?
CORPORATE PROFILE WELCOME TO DIGIALGO WHO WE ARE? We are a digital marketing company where we offer a wide array of Mobile & Internet Marketing Services with the concept of 360 Degree branding plan. We
More informationExploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA
Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users
More informationThe messenger for organizations
The messenger for organizations Table of contents 2 - Instant messaging an opportunity for companies 3 - Communication in business contexts 4 - The dangers of instant messaging 5 - Threema Work The messenger
More informationiclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationACR38 Smart Card Reader
ACR38 Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Smart Card Reader Features... 4 3.0. Smart Card Support... 5 3.1. MCU
More informationDatenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH
Datenblatt / Specifications ACR880 GPRS Portable Smart Card Terminal Otto-Hesse-Straße 19 / T5 D-64293 Darmstadt Phone +49 6151 9926567 Fax +49 6151 3689296 Table of Contents 1.0. Introduction... 3 2.0
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationACR100H SIMFlash (HID)
ACR100H SIMFlash (HID) Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Plug-In (SIM-Sized) Card Reader... 3 1.2. Mass Storage Device... 3 1.3.
More informationWhite Paper Implementing mobile electronic identity
Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing
More informationACR39 Series
ACR39 Series Units 4108 4110, 41st Floor, Manhattan Place, 23 Wang Tai Road, Kowloon Bay, HK Tel: +852-27967873 Fax: +852-27961286 info@acs.com.hk www.acs.com.hk Outline Product Overview Product Features
More informationGo beyond... IEC Leverage the full potential with leading-edge expertise. Answers for infrastructure and cities.
Go beyond... IEC 61850 Leverage the full potential with leading-edge expertise www.siemens.com/iec61850 HSR, PRP integrated Certified according to IEC 61850 Edition 2 Answers for infrastructure and cities.
More informationAPG8205 OTP Generator
APG8205 OTP Generator User Manual V1.00 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Supported Card Type... 3 1.2. Supported Language... 3 2.0. APG8205 Illustration...
More informationACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
More informationIn the Domain Name System s language, rcode 0 stands for: no error condition.
12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationThe German IT Security Certification Scheme. Joachim Weber
The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.
More informationSUMMARIES OF INTERACTIVE MULTIMEDIA
SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationPIN Entry & Management
PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance
More informationeh880 Secure Smart Card Terminal
eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...
More informationABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700
ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership:
More informationSecure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security.
Secure your business Use DIGIPASS two-factor authentication S E C U R E D PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l ic K E Y I N F R A S T R U C T U R E The world s leading software company
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationINDIVIDUAL bizhub ENHANCEMENT
INDIVIDUAL bizhub ENHANCEMENT ADVANCED FUNCTIONALITY WITH i-option Today s corporate environments depend on streamlined user operation as well as enhanced workflow capabilities. And that is exactly what
More informationINDIVIDUAL bizhub ENHANCEMENT
INDIVIDUAL bizhub ENHANCEMENT Advanced functionality with i-option Streamlining user operation and increasing workflow capabilities are important requirements in today s corporate environments. Taking
More informationMember of the BELOXX Group
Code generation via TANmode-Cloud-Server (256-bit encryption) Member of the BELOXX Group Code generation via TANmode-Cloud-Server (256-bit encryption) The automated and adjustable random code made by Beloxx
More informationAchieving online trust through Mutual Authentication
Achieving online trust through Mutual Authentication Agenda Where do we need trust online? who are the affected parties? Authenticating the site to a consumer V by V and SecureCode, next generation browsers
More informationCSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT
CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to
More informationWelcome Guide for KT Series Token
Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information
More informationDanalock makes your doors smart
Danalock makes your doors smart Danalock products are the intelligent way to control and manage the access to your home safely and comfortably. Simply lock and unlock your entrance or garage door with
More informationSeite 1 von 20
This English translation is provided for your convenience only. In the event of discrepancies the German original text shall prevail over the English translation. Version of October 2016 Version of July
More informationPCMS. PC-linked Reader with Mass Storage.
PCMS PC-linked Reader with Mass Storage www.acs.com.hk 1 Rundown 1. Product Overview 2. Product Features 3. Product Value 4. Product Application 5. Q & A 2 Product Overview 3 Product Overview The PC-linked
More informationScalable Security solutions to enable Cyber Security and to manage Digital Identities
Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationFUJITSU Security Solutions Protection of Valuable Data
of Valuable Data Fujitsu offers a wide range of innovative security solutions addressing common security threats Fujitsu s security products and solutions are easy to integrate in existing IT infrastructures
More informationIdentity Management as a Service
Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by
More informationSECURE OFFICE OF THE FUTURE
** SECURE OFFICE OF THE FUTURE HP Today Powering 430 of the Global Fortune 500 Companies Working with 250,000+ Channel Partners 18,000+ patents 2 PCs & 1 Printer ship every second HP Business Personal
More informationThe Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components
YOUR ULTIMATE AUTHENTICATION SOLUTION A l a d d i n. c o m / e T o k e n The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are
More informationRSL 400. easy handling. Safety laser scanner with two autonomous protective functions.
RSL 400 Safety laser scanner with two autonomous protective functions easy handling. www.leuze.com ONE DEVICE THAT PERFORMS THE WORK OF TWO The RSL 400 safety laser scanner sets new standards in the safeguarding
More informationACR1255U-J1 Secure Bluetooth NFC Reader
ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...
More informationDO BUSINESS BETTER. The Handheld POS For On-the-Go Transactions
w w w. l i p m a n. c o. i l DO BUSINESS BETTER The Handheld POS For On-the-Go Transactions Building on decades of reliability and innovation, Lipman designs its products to assure an ongoing Cycle of
More informationSecuring Smart Meters with MULTOS Technical Overview
Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.
More informationEpson Solutions for Financial Institutions
Epson Solutions for Financial Institutions More than 85% of the top U.S. financial institutions rely on Epson. Count on Epson to Deliver More. Epson has an unequaled reputation for advanced technology,
More informationELECTRONIC BANKING & ONLINE AUTHENTICATION
ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY
More informationOverview of PBI-blockchain cooperation technology
FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview
More informationWELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT
Cloud Networking & Management SECURE. NETWORKS. WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Welcome to the! The is the world s first hyper-integrated management system that intelligently organizes,
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationProduct Description. signosign/2. The established desktop solution for creating, edit, and sign PDF documents.
Product Description signosign/2 The established desktop solution for creating, edit, and sign PDF documents. DESCRIPTION signosign/2 is the established desktop solution from signotec for the digital, handwritten
More information