We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMarcos Windle
Modified over 2 years ago
Discover the future of security on Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool
Copyright © 2008 CIDWAY Security SA. All rights reserved – A few words on CIDWAY Swiss company based in Lausanne, Switzerland Over 10 years of experience in authentication and digital signature International network of strategic partners and resellers Presence in over 30 countries Unique proprietary patented technologies for mobile phones and Homeland security
Copyright © 2008 CIDWAY Security SA. All rights reserved – Addressable markets BankingHomeland Security Mobile applicationGovernmentHealth Corporate
Copyright © 2008 CIDWAY Security SA. All rights reserved – Business applications E-Banking E-Commerce E-Government E-Brokerage E-Health care E-Gaming E-Lottery E-Government E-Loyalty M- Payment Application Security for Customer security Remote Access Network Security Enterprise Security for Employee security All companies requiring authentication under own brand name OEM (Original Equipment Manufacturers)
Copyright © 2008 CIDWAY Security SA. All rights reserved – Product portfolio overview GAIA SDK Authentication platform SDK GAIA Server Authentication platform SESAMI Mobile Time based OTP Software token for mobile phones SESAMI Mobile SDK Token SDK for mobile phones SESAMI Slim Time based OTP Hardware token SESAMI SMS SMS based OTP for mobile phones One single authentication platform to answer all security needs and user profiles.
Mobile phones and their impact on our lives CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – By 2015, more that 2 billion people will be using mobile wallets – software that enable consumers to manage their money, including making and receiving payments, using their mobile phone. Edgar Dunn & Company, billion
Copyright © 2008 CIDWAY Security SA. All rights reserved – Revealing behaviors While going to work, you realize that you forgot your wallet and mobile phone. What would you do? 47% of surveyed people would turn back for the wallet 83% of surveyed people would turn back for their mobile phone!
Copyright © 2008 CIDWAY Security SA. All rights reserved – THE RED DOT EFFECT The mobile phone is becoming an essential part of our professional and personal lives. Explosion of mobile services and requirements: Work ( , agenda, remote access, notes, etc.) Communication (conversations, VoIP, etc.) Social network (SMS, MMS, Facebook, chat, etc.) Purchase and payment (parking tickets, ski pass, etc.) Finance (e-banking, billing, etc.) Loyalty programs (vouchers, special offers, etc.) Entertainment (games, broadcasting, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – But identity theft is also increasing… Most of our identity data and personal details are duplicable, reproducible and reusable. Statistics show that overall common attacks will double each year. Common attacks are: Brute force PIN predilection Keyloggers Password sniffers Phishing Man in the middle attack (MITM) Reverse ingeneering
Why choose mobile authentication solutions? CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – Worldwide financial crisis results in cost reduction initiatives New and alternative cost saving methods are sought Security remains a key priority Market end users now looking for a product to challenge the market Mobile Penetration rates continue to increase in emerging markets Attractive price point CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software tokens. Economic crisis – Opportunity for Mobile Solutions
Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose mobile against other authentication methods Hardware tokens are secure but… o Very expensive o Not in the spirit of mobility (one token per access) o Time limited (replacement, etc.) o Not scaled for large deployments (ref. logistics, maintenance, etc.) SMS are flexible and scaled for large deployments but… o Are less secure o Subject to recurring costs o Rely on network and operators Mobile software tokens are… o Secured o Autonomous o Flexible (no limit of tokens on mobile) o Unlimited o Scaled for large deployments
Why choose CIDWAY? CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Security Algorithm and Time based One Time Passwords Patented PIN protection in case of theft or loss of device (PIN is not stored on mobile or transmitted externally) Protection against any form of attacks, such as Cloning Brute force PIN Predilection Keyloggers Phishing Man in the middle attack (MITM) Reverse engineering Secured registration, activation and deployment Automatic time synchronization
Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Compatibility and integration Multi-OS Java Symbian Blackberry Windows CE & Pocket PC Palm OS Iphone Standalone or SDK mobile token & server Easy integration into 3rd party mobile applications Freedom of deployment scenarios (Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Rationalization of costs One device and one PIN for all your authentication needs (no need to carry different tokens) Multi-Channel Versatility (authentication, document signature, etc.) Unlimited life span (ref. software) No on-going maintenance or replacement costs Free of network and operators (no hidden costs) Up to 2/3 of cost reduction vs traditional solutions
Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? USER FRIENDLINESS Easy and intuitive solution Use of one familiar device Continuous evolution of software Create new added value services
Thank you Christophe Guignard –Marketing & Communication Manager Av. Juste-Olivier 11, 1006 Lausanne – Suisse Tél: – Fax: For more information, please visit
B-CERB complete protection against phishing copyright 2008 by Wheel.
McAfee One Time Password Easy. Flexible. Complete. 1 Product Marketing NSBU.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to WhatsUp Gold.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Credit Card Operations Bülent Şenver
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
What Are the Different Platforms for Enterprise Mobility Solutions?
CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SCOM 2007.
Copyright © 2002 ACNielsen a VNU company 3CX Partner Training December 2007.
XProtect ® Professional Efficient solutions for mid-sized installations.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
Windows Embedded for Point of Service Retail Seminar Microsoft Prague Presenter name Presenter Title.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Two Factor Authentication On Mobile, Solution for tomorrow? Nicolas Fort, Product Manager Solution for today !
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
By Hinal Pithia Monday, November 14, Overview The traditional wallet The digital wallet –How it works –Technology –Payment Models –The players –Considerations.
Smart Phones Deserve Smarter Content. Overview 1. What is Handango InHand? 2. How do I get my apps sold through InHand? 3. How can I get my own developer.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Real Security InterSwyft Technical information's.
© GSMA 2014 July 2014 The GSMA Restricted - Confidential Information © GSM Association 2014 All GSMA meetings are conducted in full compliance with the.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
Your Mobile Solution©2012 Mocapay | All rights reserved. Merchants Go Mobile Doug Dwyre | CEO |
Stephen Crick Business Development Manager Tokenless™ Authentication.
Everyone is going Wireless - VoIP is no exception Sanjit Chatterjee Director – Global Marketing
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
More than You Want to Know About Pocket PC’s. What is a Pocket PC?
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Which server is right for you? Get in Contact with us
M OBILE C OMMUNICATION S OLUTIONS FOR B USINESS. SMS Cellular Services (Pty) Ltd (SCS) was established in 1999 and is one of the leading WASPs in South.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Banking Clouds V International Youth Banking Forum.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
© 2017 SlidePlayer.com Inc. All rights reserved.