Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

Building Mobile Apps in the Cloud – Comparing Approaches.
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
Ellucian Mobile: Don’t text and drive, kids!
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Celoxis Intro Celoxis is a web-based project management software company based in India. The Celoxis application integrates management of projects, resources,
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
A few notes. First - What is the Cloud ? * Any number of blogs / articles and definitions * Accessing information services and software over the internet.
An Integrated Software for Healthcare since 1991 Yaniris Cintron.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
R Consulting Mobile IPTV Application
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Kaspersky Small Office Security INTRODUCING New for 2014!
BullGuard Identity Protection September Compatible with ANY device and ANY O/S  Identity Protection – allows users to monitor their sensitive personal.
Security by Your Own Device Keypasco AB, May 2015.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
The BEST Citrix/Microsoft RDS alternative
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
Planning, Implementing and Supporting Office 365
The BEST Citrix/Microsoft RDS alternative
GOIS Pro A User-Friendly, Innovative, Advanced and All-in-one Inventory Management Solution.
CLOUDENTIFY.
IT Security Awareness Day October 19, 2016
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
People used to install software on their computers
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
Customized Solutions to your needs
Multifactor Authentication
Cypak core technology Combat fraud and keep your customer happy
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
An Office 365 Integration Enables Cloud-Based Digital Signatures Anytime and on Any Device “Thanks to IvSign and our Microsoft Office 365 integration,
Mobile Services and Cloud Scalability Enable Connections Between Brands and Customers MINI-CASE STUDY “It became clear that Microsoft Azure was the way.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Secure Authentication Solution

Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security (eBanking, eCommerce). The company has official offices in Sweden and China, and partner offices in China, Taiwan and Brazil. Keypasco develops and provides a unique software-based secure authentication solutions for Internet Content Providers (ICPs) within:  Financial services; e-banking  Government service providers; e-government  Online gaming, gambling, and betting,  E-commerce  Electronic payment systems.  Others

Unique solution User credentials Geographical location User equipment Software Risk Management

Authentication solution Keypasco has developed a multi-factor strong authentication solution based on software, Embedded Authentication Service (EAS), on the cloud. Geolocation Device fingerprint Risk Management Username and Password PC, Tablet & Mobile devices Geographical location Monitoring threats and behaviour; continuously improvements of security User identity credentials 2 channel structure Mitigates MitM, and MitB

Software Risk Management Risk Intelligence Software  Smart enough to draw conclusions about the identity of the user via the combination of the users credentials, equipment, geographical location and time.  The software analyses and determines the characteristics of the User Profile automatically.  Easy to use.  Is updated/upgraded automatically and constantly.

Possible Threats Phishing MitM MitB Malicious Virus Control (100% control like a VNC) Theft/Robbery Geographical Location 2-channel structure Out-Of-Band (OOB) Verifications Proximity

Benefits Keypasco Authentication Solution Easy to Install No change in user behaviour Authentication Service in the cloud Authentication Out-Of-Band Proximity mobile device Push Notifications Security which is continuously developed and improved Easy and quick integration Requires minimal programming - API $0 initial investment needed Can be used as a add-on solution in an already established security solution or as a stand-alone application

Architecture Keypasco Authentication Server “Borgen” Browser Client Software “Vakten” (Unique information about the users device and/or location) Internet 1st Channel 2nd Channel Verification Channel Internet Content Provider ”Service”

Keypasco Solution Authentication Solution integrated  Authentication Service based in the Cloud  SaaS – Security as a Service  The integrated solution is not visible for the end user  No change is the ICPs established user behaviour is needed  The end user is only required to download and install the client “Vakten” on a PC, tablet, or mobile device once at registration with the EAS Solution  The EAS solution offer a higher level of security through multi-factor technology completely embedded in the client’s brand. It can be as visible as the client (ICP) wish and can function as a stand-alone application as well as a part of a established solution.  Platforms supported: Windows, Mac, Linux, iOS, and Android (4.0).

EAS Solution - Features Additional features, besides the authentication signature multi-factor security: ⇀ Out-Of-Band Authentication ⇀ Verifications provided through local clients and mobile devices ⇀ Mobile Proximity ⇀The definition: A user-centric solution which provided a BYOD (Bring Your Own Device) functionality. The mobile device adds another criteria for accessing the account – if the device isn't close enough the account can’t be accessed.

How does it work? DeviceID GeoLoc UserID Password OK