KOBIL worldwide secure online banking. Take the challenge anytime, anywhere

Size: px
Start display at page:

Download "KOBIL worldwide secure online banking. Take the challenge anytime, anywhere"

Transcription

1 KOBIL worldwide secure online banking Take the challenge anytime, anywhere

2 KOBIL stands for secure data and secure communication on any computer in the world. Whether it is for business or private use, KOBIL offers optimal protection for every online workplace and also makes e-banking an easy and comfortable process. Our vision is simple: a secure workplace now and in the future. The market leader in the technology sector sets new standards with its hardware and software products, and is considered a trend setter with its midentity, the smallest bank branch in the world, measuring just 16.9 cm². KOBIL products are future-proof and, thanks to their upgradeability, are always at the cutting edge of development. E-banking solutions powered by KOBIL - these are solutions that offer clear added value to the end customer. The three product lines midentity, SecOVID (One Time Password) and smart card terminals are revenue drivers that open up new business models for the banking industry. KOBIL technology is used by numerous companies such as Deutsche Telekom, Swisscom, Arcor/Vodafone, T-Systems, DATEV, Commerzbank, UBS, Migros Bank, Rothschild Bank, YapıKredi and Isbank as well as the German Parliament, and the German Federal Office for Information Security (BSI). Our vision: a secure workplace now and in the future

3 We at KOBIL take pride in taking on the greatest challenges in product development: to make online banking mobile, user-friendly and highly secure. That is why we always need to stay one step ahead of the game, offering products that make innovative security technology ready for hands-on applications in every day life. We live up to this challenge every day. With more than 23 years of experience in the areas of cryptography, smart card and PKI technology, KOBIL counts among the pioneers of highly secure online banking. Our all-round solutions stand for secure and easy e-banking, making legally binding bank transactions possible worldwide and as safe as in your local bank branch. Welcome fringe benefits of deploying this groundbreaking technology include your cross-selling opportunities and customer loyalty. Hardware and software components that render e-banking authentic and highly secure for a long time are the result of our drive for innovation. Bank Full service solutions for secure online banking

4 UBS Commerzbank YapıKredi MIGROS BANK swisscom Deutsche Vermögensberatung IBM SIEMENS FUJITSU-SIEMENS Deutsche Telekom T-Online T-Systems T-TeleSec Route1 Hypo Vereinsbank Vodafone bank-verlag köln VOLKSWOHL BUND BADENIA DG VERLAG Deutscher Sparkassen Verlag UniCredit Bundes- amt für Sicherheit in der Informationstechnik The great success of our products has made us a reliable partner to many well-known companies from around the world. Bundesnetzagentur McAfee RWE Basler Versicherungen DATEV TÜRKİYE İŞ BANKASI T.C. Ziraat Bankası ING Akbank Koç Grup Worldwide satisfied customers

5 Automatic secure updates for software and firmware The ideal customer retention tool due to the many crossselling opportunities it offers Non-install and portable smart card applications midentity Docking, steady go: midentity enables user authentication, electronic signature and encryption of s, thus making it a state-of-the art mobile solution for online banking. The common challenge of conducting banking transactions online just as secure and convenient as you would in your local bank branch is a thing of the past: All necessary software you need to conduct secure online transactions is already stored on board of midentity you simply have to plug it into the USB port of any web-enabled computer. Online banking without any installation on any Windows, MacOS and Linux computer Fraud protection through hardened applications on board of midentity Longtime protection of your investment thanks to our secure update service Highly secure communication due to the application of digital signatures Convenient usage through easy plug & play installation Easy adaption to changes in infrastructure Replaceable smart cards provide an enormously long product life cycle Fully interoperable with existing standards and specifications Your portable freedom

6 midentity fullsize Completely mobile and running on MacOS, Linux and Windows Continue using your existing smart card in a convenient way with our high security technology. KOBIL midentity fullsize is based on the same technology as midentity except that as a bank customer, you can now use it with your regular bank card. Your existing bank card combined with midentity full size provides ideal security in online banking. User friendly through the usage of full size smart cards Support of full size cards (ISO format) Support of MacOS, Linux and Windows Update service for both firmware and software Easy usage through plug & play Hardened applications on board Anonymous card production system Device management system User mapping Easy plug & play installation with a USB-cable Full size full security

7 Keypad for convenient key entry what you see is what you sign midentity visual S/L future-proof technology for full size and SIM-sized smart cards Backlight display for improved visibility midentity visual S / L What you see is what you sign this slogan best describes the main advantage of KOBIL midentity visual. Internet attacks increase every day and users often do not know if their original transactions have been modified by the time they sign them. This problem is solved by midentity visual because it has a display on which your entered data can be verified before signing. What you see is high security. WYSIWYS (What you see is what you sign) High contrast display Easy-to-use keypad Usable with full size smart cards and SIM-sized smart cards Support of MacOS, Linux, Windows Hardened browser and other applications already on board Secure updates for firmware and software Very high level of security and convenience Anonymous card production Zero footprint for smart card applications What you see is what you sign

8 Smart card technology at the price of OTP technology midentity Token midentity token is the cost-effective alternative to OTP technology offering highest security and mobility levels through the use of a smart card. Longtime protection of your investment as well as ideal customer loyalty are guaranteed by our secure update service, which keeps your token at the cutting edge of development. Non-install smart card applications Automatic firmware updates Portable banking without any installation on any Windows, MacOS or Linux computer Longtime protection of investment thanks to our secure update service Convenient and easy usage through plug & play Exchangeable smart cards provide an enormously long life cycle Support of international standards for quick implementation Zero footprint for smart card applications The smart start

9 Backlight display for improved visibility midentity Token visual S/L Future-proof technology for full size and sim-sized smart cards midentity Token visual S / L What you see is what you sign this slogan best describes the main advantage of KOBIL midentity visual. Internet attacks increase every day and users often do not know if their original transactions have been modified by the time they sign them. This problem is solved by midentity visual because it has a display on which your entered data can be verified before signing. What you see is high security. midentity token visual is the cost-effective alternative to midentity visual. Keypad for convenient key entry what you see is what you sign Exchangeable smart card full size cards and SIM-sized cards Data display for the verification of information Key pad for convenient data entry Portable banking without any installation on any Windows, MacOS or Linux computer Convenient and easy usage through plug & play Secure update service for firmware and software Central access management Identity management Device management Easy rollout mechanism Just secure - what else

10 Large and logically consistent arrangement of keys for error-free code entry Large, high-contrast display for improved visibility DSA-Technology optical interface for easy & secure data communication CAP Optimus comfort The CAP Optimus comfort reader is the latest innovation by KOBIL. Your bank card along with CAP Optimus comfort and any web-enabled PC will be all you need for secure and easy online communication. This well-designed device has integrated optical sensors on the back allowing to read the flickering code displayed on your PC screen to generate your TAN highest online security made by KOBIL. Easy-to-read display Large and easy-to-use keypad Best ergonomics (Lego compliant) Easily replaceable batteries Colored keypad Convenient use in upright format Multilingual (English, German, Turkish) Exellent transfer-detection due to DSA technology Elegance combined with perfect ergonomics

11 Large, high-contrast display for improved visibility KOBIL SecOPTIC We upgraded our well-established OTP technology by yet another technological highlight. The KOBIL SecOPTIC token is equipped with a display as well as a keypad and optical interface for what you see is what you sign. KOBIL SecOPTIC is designed for the convenient use of online banking. Keypad for easy signing - What you see is what you sign Optical interface Display and keypad Cost-effective alternative to smart card readers Replaceable battery High level of security and convenience Easy integration in IT infrastructure Reducing helpdesk costs DSA-Technology optical interface supports easy & secure data communication Advanced security technology

12 Event-synchronous technology You get it when you need it High cost-effectiveness Permanent usability of token through replaceable batteries KOBIL SecOVID Token SecOVID is the product line by KOBIL closing the security gap caused by static, reusable passwords in online banking environments once and for all. This easy way of authentication is independent of the client as well as the software and operating system on the PC. Highly secure access to an online banking platform guarantees longtime customer loyalty. Smooth integration into existing environments through the support of international standards such as Radius or OATH High performance server Unlimited scalability Centralized and simple management of user data Interoperability with third party providers High mobility for the user due to a small token (size of a key ring) OATH version available A simple way of security

13 Automatic secure update for firmware Usage of online and offline functions with one device Runs without any installation on Windows, MAC OS and Linux computers EMV TriCAP Users are on the safe side using this compact and attractive smart card terminal for electronic business. The EMV TriCAP makes PIN interception through viruses or trojans impossible because your data is entered not via the PC, but via the integrated device keypad. Thus, the EMV-CAP Reader contributes in an essential way to enhancing the security and confidentiality in the electronic world. Secure firmware updates for flexible customization in response to new requirements Large, easy-to-handle keypad for secure PIN entry Compatibility with all common standards, including EMV-CAP (connected & unconnected reader) Comprehensive driver support Durable material Online/offline operation Collapsible USB docking station for online operation Common Criteria EAL3+ certified Compliant with German signature law Alphanumerical display for authentic messages Get more of your smart card

14 HTTPS (SOAP) secure your smart security management With the midentity smart security server you can manage your midentity devices all over the world thanks to new technologies like smart spdate, smart check and Existing customer Infrastructure Server Bank KOBIL smart security management Identity Management. midentity combines security when updating software and firmware with a considerable reduction of support costs and guarantees your flexibility and security for the next five years. HTTPS (Browser) Administrator, HelpDesk etc. smart security management

15 M-IDentity enhances security for customers of Migrosbank Due to the continuously rising number of phishing attacks and other cyber crime on the Internet, Migrosbank as the first bank in Switzerland offers their M-BankcNet customers a new technology to carry out e-banking transactions M-IDentity. M-IDentity impresses with both high security and high user convenience. Moreover, the technology is easy to use and completely mobile. Since customers do not have to install any software on the computer, they can insert their USB drive into any PC to access M-BancNet. This innovative system was developed by the German IT security provider KOBIL Systems with headquarters in Worms, Germany. Best of: Free of charge for all customers of Migrosbank Hardened browser on board Secure updates for firmware and software Java on board Adapts to changes in infrastructure Intelligent management system Relaceable smart card Digital signature enabled The next generation in payment transactions If inserted into the USB port of any web-enabled computer, midentity will lead you to the login page of your payment transactions application within Commerzbank s corporate banking portal. There is no need to enter URLs and the system works independent of the software equipment of the host computer because midentity already has its own browser on board. Thanks to automatic updates, midentity is always equipped with the latest software and firmware. With this new technology, accessing your bank account has never been easier all you have to do is to enter your user number and PIN. Furthermore, your electronic signature is stored safely on midentity and protected with a personal password. Your digital signature authorizes your payment transactions without any additional effort or data entry anytime and practically everywhere. Best of: Your accounts at Commerzbank as well as accounts at other banks can be managed jointly Mass transactions and scheduled payments can be conducted effortlessly Account information can also be retrieved from other banks Transactions can be managed worldwide in an easy way Direct access and authorization Distributed digital signature Flexible allocation of rights Trust is good - references are better

16 KOBIL midentity / midentity Fullsize midentity Token/ visual S / visual L midentity visual S/ visual L EMV TriCAP CAP Optimus comfort KOBIL SecOVID Token/ SecOPTIC The midentity is a USB-based device using a smart card to ensure highly secure and convenient communication while protecting data from thirdparty access, much in the manner of a safe. Therefore, the hardware characteristics of midentity provide global mobility and permanent security for your data and applications without any installation. Security combined with userfriendliness are the main concerns of KOBIL. All the user needs to do is to plug in midentity into the USB port of any given PC. That s it. Retail banking customers often see themselves confronted with the issue of having to choose between high user convenience or high security in online banking. midentity token, however, is a portable smart card terminal offering all the security and mobility a user may need at the lowest price you can imagine. Due to the replaceable smart card and update technology of midentity token, your investment is protected longtime. What you see is what you sign. This slogan describes the main advantage of KOBIL midentity visual. Internet attacks are increasing day by day and users often do not know if they signed their transactions as they typed in before. This problem is solved by our technology. Because you can read the transaction data on the display of midentity visual and can exactly sign this information. What you see is highsecurity. As a user, you will be on the safe side using this compact and attractive smart card terminal for your electronic business applications. What is more, the EMV-CAP reader makes PIN interception through viruses or trojans impossible because your data is not entered via the PC, but via the integrated device keypad. Thus, the EMV TriCAP contributes in an essential way to enhancing the security and confidentiality in the electronic world. The reader can be used online and offline for EMV-CAP applications and is Common Criteria certified. This innovative optical reader offers more security and convenience in online and home banking. It reads the flickering code on the PC screen through its optical sensors on the back. The transaction data is transferred simply by holding your reader in front of the PC screen. This way the procedure offers an effective protection against phishing and other methods of data theft. Self explaining symbols, a trilingual user menu, ideal ergonomics and easy to replace batteries an intelligent and practical solution, made by KOBIL. Forgetting your static password is a good way to start it is the start of higher security. What is even better is to have a billion passwords which you do not even know yourself. This is the concept of the SecOVID system. At the touch of a button, the KOBIL Sec- OVID token calculates a numerical one time password from more than one billion possible combinations, displays it on the screen and instantly forgets it as soon as the application is closed. For more information: KOBIL Systems GmbH Fon: Fax: info@kobil.com Web: KOBIL: full service solutions

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible KOBIL Mobile, Secure and Flexible KOBIL is the ideal product for the mobile, yet safe transportation of your data and the protection of your digital identity. The perfectly integrated smartcard technology

More information

APG8201 PINHandy

APG8201 PINHandy APG8201 PINHandy Units 2010-2013, 20th Floor Chevalier Commercial Centre 8 Wang Hoi Road, Kowloon Bay, HK Tel: +852-27967873 Fax: +852-27961286 info@acs.com.hk www.acs.com.hk Outline 1. Product Overview

More information

Smart Payments. Generating a seamless experience in a digital world.

Smart Payments. Generating a seamless experience in a digital world. Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,

More information

COMMUNICATION SERVER INTEGRAL 55 LX

COMMUNICATION SERVER INTEGRAL 55 LX IP Telephony Contact Centers Mobility Services OVERVIEW COMMUNICATION SERVER INTEGRAL 55 LX As a leading supplier of communication systems and services, Avaya designs, builds and manages communication

More information

Card Issuance/Encoding & PIN Pads

Card Issuance/Encoding & PIN Pads Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,

More information

Security Solutions for Mobile Users in the Workplace

Security Solutions for Mobile Users in the Workplace Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Moser Baer Group 25 years of excellence

Moser Baer Group 25 years of excellence Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets

More information

Use Digipass two-factor authentication

Use Digipass two-factor authentication DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

Sagem Orga Strong, Global, Innovative.

Sagem Orga Strong, Global, Innovative. Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence

More information

Display Cards for Securing E Commerce

Display Cards for Securing E Commerce Display Cards for Securing E Commerce Don Malloy Business Development Manager 10th February 2012 Salt Lake City Nagra Kudelski Group Activity Lines Group Revenue 2010 : USD 1.1B Physical access solutions

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

epass FIDO -NFC PRODUCT MANUAL

epass FIDO -NFC PRODUCT MANUAL epass FIDO -NFC PRODUCT MANUAL V1.3 2017-03 FEITIAN Technologies Co., Ltd. Website: www.ftsafe.com Overview Feitian epass FIDO -NFC is a FIDO alliance certified U2F authentication key. Unlike the traditional

More information

SxS Authentication solution. - SXS

SxS Authentication solution. - SXS SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet

More information

System to assure authentication and transaction security. Presentation of the concept and product May 2009

System to assure authentication and transaction security. Presentation of the concept and product May 2009 System to assure authentication and transaction security Presentation of the concept and product May 2009 AXSionics AG, Neumarktstrasse 27, 2503 Biel, Switzerland Information: Dr. Lorenz Müller Lorenz.mueller@axsionics.ch

More information

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate

More information

APG8201 PINhandy 1. Technical Specifications. Subject to change without prior notice

APG8201 PINhandy 1. Technical Specifications.  Subject to change without prior notice APG8201 PINhandy 1 Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical Specifications...

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Asseco SEE Authentication Solutions. ASEBA SxS, ASEBA Mobile Token

Asseco SEE Authentication Solutions. ASEBA SxS, ASEBA Mobile Token Asseco SEE Authentication Solutions ASEBA SxS, ASEBA Mobile Token Robert Mihaljek Sales Professional September, 2012. Sofia, Bulgaria Agenda About Asseco Threaths User authentication options Our Solution

More information

The secure remote support, remote access and online meeting software that the world relies on.

The secure remote support, remote access and online meeting software that the world relies on. The secure remote support, remote access and online meeting software that the world relies on. TeamViewer, the market leader activated by users on 1.3 billion devices worldwide. The Right Solution for

More information

OATH : An Initiative for Open AuTHentication

OATH : An Initiative for Open AuTHentication OATH : An Initiative for Open AuTHentication Who Are You Really Doing Business With? 2 Oath Proprietary Confidential The New York Magazine, July 5, 1993, Peter Steiner, The Economic Promise of e-business

More information

ECOS SECURE BOOT STICK

ECOS SECURE BOOT STICK ECOS SECURE BOOT STICK Highly Secure Access to Data and Applications Highly secure Budget-friendly All on one stick Remote Data Access Easy, Flexible, Highly Secure Public authorities, institutions and

More information

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free! LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable

More information

Next Level Remote Access

Next Level Remote Access Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

NEVIS Smart Solutions against sophisticated attackers

NEVIS Smart Solutions against sophisticated attackers NEVIS Smart Solutions against sophisticated attackers Stephan Schweizer NEVIS Product Manager March 2016 1 AdNovum at a Glance Enterprise-scale software and security solutions Founded in 1988, privately

More information

The Gemalto offer for PKI market in Russia

The Gemalto offer for PKI market in Russia The Gemalto offer for PKI market in Russia Miroslaw TOCICKI, Technical Consultant September 18th, 2014 Agenda Introduction Gemalto IdA portfolio Java PKI cards for developers GOST certified solution IDPrime

More information

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,

More information

The Real Time IP System for medium-sized up to very large enterprises. HiPath

The Real Time IP System for medium-sized up to very large enterprises. HiPath The Real Time IP System for medium-sized up to very large enterprises HiPath 4000 www.siemens.com/hipath As a successful company, you know how important communication is for your business. Regardless of

More information

Identity and Authentication PKI Portfolio

Identity and Authentication PKI Portfolio Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime

More information

Secure and simple authentication via mobile phone.

Secure and simple authentication via mobile phone. Secure and simple authentication via mobile phone. Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it easier

More information

Security Solutions. End-to-end security. Protecting your physical access control system.

Security Solutions. End-to-end security. Protecting your physical access control system. Security Solutions End-to-end security Protecting your physical access control system. www.nedapsecurity.com security common practice Bringing IT best practices to physical security Often, companies don

More information

NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY.

NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY. NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY. MACMON MODULE & BUNDLES DEVELOPMENT It is macmon s mission to improve and further develop its products. Exciting extensions are currently being worked

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

APG8202 PINhandy 2 OTP Generator

APG8202 PINhandy 2 OTP Generator APG8202 PINhandy 2 OTP Generator Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

Secure Card Reading and PIN Solutions

Secure Card Reading and PIN Solutions Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek

More information

Markus Bartsch. German Smart Metering and European Privacy Needs

Markus Bartsch. German Smart Metering and European Privacy Needs Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy

More information

AS emas emudhra Authentication Solution

AS emas emudhra Authentication Solution AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a

More information

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.

More information

ACR38U PocketMate. Smart Card Reader. Technical Specifications. Subject to change without prior notice

ACR38U PocketMate. Smart Card Reader. Technical Specifications.   Subject to change without prior notice ACR38U PocketMate Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Ingenious Design... 3 1.3.

More information

Optical Disc Libraries. No compromises. Put your trust in the new generation of data storage!

Optical Disc Libraries. No compromises. Put your trust in the new generation of data storage! Optical Disc Libraries No compromises. Put your trust in the new generation of data storage! Reliable data storage is not a question of convenience. It is protection and security for the future. Time for

More information

ACR89 Handheld Smart Card Reader Technical Specifications. Datenblatt / Specifications

ACR89 Handheld Smart Card Reader Technical Specifications. Datenblatt / Specifications Datenblatt / Specifications ACR89 Handheld Smart Card Reader Technical Specifications idvation GmbH Otto-Hesse-Straße 19 / T5 Phone +49 6151 9926567 D-64293 Darmstadt Fax +49 6151 3689296 info@idvation.com

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports

More information

Is Your Online Bank Really Secure?

Is Your Online Bank Really Secure? Is Your Online Bank Really Secure? Zoltan Szalai / ebanking Solution Manager April 25, 2013 2 Gemalto for You ONE THIRD OF THE WORLD S POPULATION USE OUR SOLUTIONS EVERYDAY BANKS & RETAIL TELECOM TRANSPORT

More information

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services

More information

CitiDirect BE Portal Security, technical requirements and configuration

CitiDirect BE Portal Security, technical requirements and configuration CitiDirect BE Portal Security, technical requirements and configuration CitiService CitiDirect BE Helpdesk tel. 801 343 978, +48 22 690 15 21 Monday to Friday; 8:00 17:00 helpdesk.ebs@citi.com www.citihandlowy.pl

More information

WELCOME TO DIGIALGO WHO WE ARE? WHAT WE DO?

WELCOME TO DIGIALGO WHO WE ARE? WHAT WE DO? CORPORATE PROFILE WELCOME TO DIGIALGO WHO WE ARE? We are a digital marketing company where we offer a wide array of Mobile & Internet Marketing Services with the concept of 360 Degree branding plan. We

More information

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users

More information

The messenger for organizations

The messenger for organizations The messenger for organizations Table of contents 2 - Instant messaging an opportunity for companies 3 - Communication in business contexts 4 - The dangers of instant messaging 5 - Threema Work The messenger

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

ACR38 Smart Card Reader

ACR38 Smart Card Reader ACR38 Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Smart Card Reader Features... 4 3.0. Smart Card Support... 5 3.1. MCU

More information

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH Datenblatt / Specifications ACR880 GPRS Portable Smart Card Terminal Otto-Hesse-Straße 19 / T5 D-64293 Darmstadt Phone +49 6151 9926567 Fax +49 6151 3689296 Table of Contents 1.0. Introduction... 3 2.0

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

ACR100H SIMFlash (HID)

ACR100H SIMFlash (HID) ACR100H SIMFlash (HID) Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Plug-In (SIM-Sized) Card Reader... 3 1.2. Mass Storage Device... 3 1.3.

More information

White Paper Implementing mobile electronic identity

White Paper Implementing mobile electronic identity Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing

More information

ACR39 Series

ACR39 Series ACR39 Series Units 4108 4110, 41st Floor, Manhattan Place, 23 Wang Tai Road, Kowloon Bay, HK Tel: +852-27967873 Fax: +852-27961286 info@acs.com.hk www.acs.com.hk Outline Product Overview Product Features

More information

Go beyond... IEC Leverage the full potential with leading-edge expertise. Answers for infrastructure and cities.

Go beyond... IEC Leverage the full potential with leading-edge expertise.   Answers for infrastructure and cities. Go beyond... IEC 61850 Leverage the full potential with leading-edge expertise www.siemens.com/iec61850 HSR, PRP integrated Certified according to IEC 61850 Edition 2 Answers for infrastructure and cities.

More information

APG8205 OTP Generator

APG8205 OTP Generator APG8205 OTP Generator User Manual V1.00 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Supported Card Type... 3 1.2. Supported Language... 3 2.0. APG8205 Illustration...

More information

ACR880 GPRS Portable Smart Card Terminal

ACR880 GPRS Portable Smart Card Terminal ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.

More information

In the Domain Name System s language, rcode 0 stands for: no error condition.

In the Domain Name System s language, rcode 0 stands for: no error condition. 12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

The German IT Security Certification Scheme. Joachim Weber

The German IT Security Certification Scheme. Joachim Weber The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

PIN Entry & Management

PIN Entry & Management PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance

More information

eh880 Secure Smart Card Terminal

eh880 Secure Smart Card Terminal eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...

More information

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700 ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership:

More information

Secure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security.

Secure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security. Secure your business Use DIGIPASS two-factor authentication S E C U R E D PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l ic K E Y I N F R A S T R U C T U R E The world s leading software company

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

INDIVIDUAL bizhub ENHANCEMENT

INDIVIDUAL bizhub ENHANCEMENT INDIVIDUAL bizhub ENHANCEMENT ADVANCED FUNCTIONALITY WITH i-option Today s corporate environments depend on streamlined user operation as well as enhanced workflow capabilities. And that is exactly what

More information

INDIVIDUAL bizhub ENHANCEMENT

INDIVIDUAL bizhub ENHANCEMENT INDIVIDUAL bizhub ENHANCEMENT Advanced functionality with i-option Streamlining user operation and increasing workflow capabilities are important requirements in today s corporate environments. Taking

More information

Member of the BELOXX Group

Member of the BELOXX Group Code generation via TANmode-Cloud-Server (256-bit encryption) Member of the BELOXX Group Code generation via TANmode-Cloud-Server (256-bit encryption) The automated and adjustable random code made by Beloxx

More information

Achieving online trust through Mutual Authentication

Achieving online trust through Mutual Authentication Achieving online trust through Mutual Authentication Agenda Where do we need trust online? who are the affected parties? Authenticating the site to a consumer V by V and SecureCode, next generation browsers

More information

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to

More information

Welcome Guide for KT Series Token

Welcome Guide for KT Series Token Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information

More information

Danalock makes your doors smart

Danalock makes your doors smart Danalock makes your doors smart Danalock products are the intelligent way to control and manage the access to your home safely and comfortably. Simply lock and unlock your entrance or garage door with

More information

Seite 1 von 20

Seite 1 von 20 This English translation is provided for your convenience only. In the event of discrepancies the German original text shall prevail over the English translation. Version of October 2016 Version of July

More information

PCMS. PC-linked Reader with Mass Storage.

PCMS. PC-linked Reader with Mass Storage. PCMS PC-linked Reader with Mass Storage www.acs.com.hk 1 Rundown 1. Product Overview 2. Product Features 3. Product Value 4. Product Application 5. Q & A 2 Product Overview 3 Product Overview The PC-linked

More information

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Scalable Security solutions to enable Cyber Security and to manage Digital Identities Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

FUJITSU Security Solutions Protection of Valuable Data

FUJITSU Security Solutions Protection of Valuable Data of Valuable Data Fujitsu offers a wide range of innovative security solutions addressing common security threats Fujitsu s security products and solutions are easy to integrate in existing IT infrastructures

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

SECURE OFFICE OF THE FUTURE

SECURE OFFICE OF THE FUTURE ** SECURE OFFICE OF THE FUTURE HP Today Powering 430 of the Global Fortune 500 Companies Working with 250,000+ Channel Partners 18,000+ patents 2 PCs & 1 Printer ship every second HP Business Personal

More information

The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components

The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components YOUR ULTIMATE AUTHENTICATION SOLUTION A l a d d i n. c o m / e T o k e n The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are

More information

RSL 400. easy handling. Safety laser scanner with two autonomous protective functions.

RSL 400. easy handling. Safety laser scanner with two autonomous protective functions. RSL 400 Safety laser scanner with two autonomous protective functions easy handling. www.leuze.com ONE DEVICE THAT PERFORMS THE WORK OF TWO The RSL 400 safety laser scanner sets new standards in the safeguarding

More information

ACR1255U-J1 Secure Bluetooth NFC Reader

ACR1255U-J1 Secure Bluetooth NFC Reader ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...

More information

DO BUSINESS BETTER. The Handheld POS For On-the-Go Transactions

DO BUSINESS BETTER. The Handheld POS For On-the-Go Transactions w w w. l i p m a n. c o. i l DO BUSINESS BETTER The Handheld POS For On-the-Go Transactions Building on decades of reliability and innovation, Lipman designs its products to assure an ongoing Cycle of

More information

Securing Smart Meters with MULTOS Technical Overview

Securing Smart Meters with MULTOS Technical Overview Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.

More information

Epson Solutions for Financial Institutions

Epson Solutions for Financial Institutions Epson Solutions for Financial Institutions More than 85% of the top U.S. financial institutions rely on Epson. Count on Epson to Deliver More. Epson has an unequaled reputation for advanced technology,

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT

WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Cloud Networking & Management SECURE. NETWORKS. WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Welcome to the! The is the world s first hyper-integrated management system that intelligently organizes,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Product Description. signosign/2. The established desktop solution for creating, edit, and sign PDF documents.

Product Description. signosign/2. The established desktop solution for creating, edit, and sign PDF documents. Product Description signosign/2 The established desktop solution for creating, edit, and sign PDF documents. DESCRIPTION signosign/2 is the established desktop solution from signotec for the digital, handwritten

More information