We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMarcos Windle
Modified over 4 years ago
Discover the future of security on www.cidway.com Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com2 A few words on CIDWAY Swiss company based in Lausanne, Switzerland Over 10 years of experience in authentication and digital signature International network of strategic partners and resellers Presence in over 30 countries Unique proprietary patented technologies for mobile phones and Homeland security
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com3 Addressable markets BankingHomeland Security Mobile applicationGovernmentHealth Corporate
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com4 Business applications E-Banking E-Commerce E-Government E-Brokerage E-Health care E-Gaming E-Lottery E-Government E-Loyalty M- Payment Application Security for Customer security Remote Access Network Security Enterprise Security for Employee security All companies requiring authentication under own brand name OEM (Original Equipment Manufacturers)
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com5 Product portfolio overview GAIA SDK Authentication platform SDK GAIA Server Authentication platform SESAMI Mobile Time based OTP Software token for mobile phones SESAMI Mobile SDK Token SDK for mobile phones SESAMI Slim Time based OTP Hardware token SESAMI SMS SMS based OTP for mobile phones One single authentication platform to answer all security needs and user profiles.
Mobile phones and their impact on our lives CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com7 By 2015, more that 2 billion people will be using mobile wallets – software that enable consumers to manage their money, including making and receiving payments, using their mobile phone. Edgar Dunn & Company, 2008 2 billion
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com8 Revealing behaviors While going to work, you realize that you forgot your wallet and mobile phone. What would you do? 47% of surveyed people would turn back for the wallet 83% of surveyed people would turn back for their mobile phone!
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com9 THE RED DOT EFFECT The mobile phone is becoming an essential part of our professional and personal lives. Explosion of mobile services and requirements: Work (e-mail, agenda, remote access, notes, etc.) Communication (conversations, VoIP, etc.) Social network (SMS, MMS, Facebook, chat, etc.) Purchase and payment (parking tickets, ski pass, etc.) Finance (e-banking, billing, etc.) Loyalty programs (vouchers, special offers, etc.) Entertainment (games, broadcasting, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com10 But identity theft is also increasing… Most of our identity data and personal details are duplicable, reproducible and reusable. Statistics show that overall common attacks will double each year. Common attacks are: Brute force PIN predilection Keyloggers Password sniffers Phishing Man in the middle attack (MITM) Reverse ingeneering
Why choose mobile authentication solutions? CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com12 Worldwide financial crisis results in cost reduction initiatives New and alternative cost saving methods are sought Security remains a key priority Market end users now looking for a product to challenge the market Mobile Penetration rates continue to increase in emerging markets Attractive price point CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software tokens. Economic crisis – Opportunity for Mobile Solutions
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com13 Why choose mobile against other authentication methods Hardware tokens are secure but… o Very expensive o Not in the spirit of mobility (one token per access) o Time limited (replacement, etc.) o Not scaled for large deployments (ref. logistics, maintenance, etc.) SMS are flexible and scaled for large deployments but… o Are less secure o Subject to recurring costs o Rely on network and operators Mobile software tokens are… o Secured o Autonomous o Flexible (no limit of tokens on mobile) o Unlimited o Scaled for large deployments
Why choose CIDWAY? CIDWAY Security SA
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com15 Why choose CIDWAYs mobile solutions? Security Algorithm and Time based One Time Passwords Patented PIN protection in case of theft or loss of device (PIN is not stored on mobile or transmitted externally) Protection against any form of attacks, such as Cloning Brute force PIN Predilection Keyloggers Phishing Man in the middle attack (MITM) Reverse engineering Secured registration, activation and deployment Automatic time synchronization
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com16 Why choose CIDWAYs mobile solutions? Compatibility and integration Multi-OS Java Symbian Blackberry Windows CE & Pocket PC Palm OS Iphone Standalone or SDK mobile token & server Easy integration into 3rd party mobile applications Freedom of deployment scenarios (Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com17 Why choose CIDWAYs mobile solutions? Rationalization of costs One device and one PIN for all your authentication needs (no need to carry different tokens) Multi-Channel Versatility (authentication, document signature, etc.) Unlimited life span (ref. software) No on-going maintenance or replacement costs Free of network and operators (no hidden costs) Up to 2/3 of cost reduction vs traditional solutions
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com18 Why choose CIDWAYs mobile solutions? USER FRIENDLINESS Easy and intuitive solution Use of one familiar device Continuous evolution of software Create new added value services
Thank you Christophe Guignard –Marketing & Communication Manager Av. Juste-Olivier 11, 1006 Lausanne – Suisse Tél: +41 21 331 27 00 – Fax: +41 21 331 27 09 - Email: email@example.com For more information, please visit www.cidway.com
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
B-CERB complete protection against phishing copyright 2008 by Wheel.
Govern the Flow of Data: Moving from Chaos to Control
Credit Card Operations Bülent Şenver
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Everyone is going Wireless - VoIP is no exception Sanjit Chatterjee Director – Global Marketing
McAfee One Time Password
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Your Mobile Solution©2012 Mocapay | All rights reserved. Merchants Go Mobile Doug Dwyre | CEO |
M OBILE C OMMUNICATION S OLUTIONS FOR B USINESS. SMS Cellular Services (Pty) Ltd (SCS) was established in 1999 and is one of the leading WASPs in South.
Adding SMS functionality to WhatsUp Gold
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
XProtect ® Professional Efficient solutions for mid-sized installations.
4/6/ :35 AM © 2004 Microsoft Corporation. All rights reserved.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
Which server is right for you? Get in Contact with us
© 2018 SlidePlayer.com Inc. All rights reserved.