Data Connectors © ASSA ABLOY. All rights reserved. HID Global

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

NexSentry Imaging Solutions
PRODUCT PRESENTATION QUANTUM2. EVOLIS QUANTUM, MODULAR SYSTEM FOR CENTRALIZED CARD PRODUCTION.
Govern the Flow of Data: Moving from Chaos to Control
RFID / ID Security: Card Identity Solutions
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Mobile Devices in the DoD
[Nom du produit] When it prints, youre impressed Product Presentation June 2007.
McAfee One Time Password
Computer time and attendance system for small business with up to 50 employees. 3 terminal types to chose from. Install your self, or have our technicians.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
4/6/ :35 AM © 2004 Microsoft Corporation. All rights reserved.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Which server is right for you? Get in Contact with us
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
OBR70121a ILS NiceLabel v5 Standard Series ILS NiceLabel product series for barcode and RFID label design, printing and entry-level integration.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
[Nom du produit] When it prints, you’re impressed Product Presentation.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Charles James Director Microsoft Alliance EMEA Polycom Microsoft UC Innovation Partner of the Year.
1Copyright 2011 FUJITSU Zero Clients Maximum Savings, Maximum Flexibility.
Identity and Access Management
RSA SecurID November 10, 2005.
Athena Smartcard Solutions June 2009 Smart Card Technology and Security Leaders.
Certificate and Key Storage Tokens and Software
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control.
Name Company A Day in the Life… A Demonstration of Application Delivery.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Building a Fully Trusted Authentication Environment
verifone HQtm Estate Management Solution
Power LogOn® Adds Card-Based, Multi- Factor Authentication to Microsoft Azure Logon, Plus Password Management for All Other Logons MICROSOFT AZURE ISV.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
WAVECOM©2005. All rights reserved 1 Intelligent Device Management Service Offer Emmanuel Walckenaer April Lisboa.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
COSEC ARC IP based Access Control Panel.
Laplink PCmover.
Public Key Infrastructure from the Most Trusted Name in e-Security
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Data Connectors © 2006. ASSA ABLOY. All rights reserved. HID Global January 2010 © 2006. ASSA ABLOY. All rights reserved.

Overview: ASSA ABLOY The worldwide leader in locking solutions Annual revenues of $4.5 billion 150 companies in 40 countries Over 30,000 employees Dedicated to meeting customer needs for safety, security, and convenience

About HID Global Part of ASSA ABLOY’s Global Technologies Division Global leader in solutions for the delivery of secure identity Award-winning products are used in over 70% of Fortune 1000 companies The most highly recognized brand in the security industry worldwide Over 500 million cards and 6 million readers active Over 1900 employees globally

Identity and Access Management Our Core Businesses secure identity BUSINESSES APPLICATIONS PRODUCTS Identity and Access Management Physical access control Logical access Secure issuance Cards Readers Networked Solutions Card Printers Software Identification Solutions eGovernment Cashless payment Industry and logistics Animal ID Transponders Inlays HID Connect Global partner program Reader modules Developer kits Tags Fobs solutions 4

HID Connect Partner Program PRODUCTS OEM Reader Modules and Boards OEM Development Kits PARTNER SOLUTIONS Time and attendance Cashless vending Parking control Biometrics Mobile verification Photo ID printing Many others TECHNOLOGIES HID Prox Indala Prox HID iCLASS COMPANIES Over 100 active development partners worldwide Co-marketing PEOPLE HID Connect Team coordinates worldwide sales and support activity Annual iNNOVATIONS conferences

Cards Printers Controllers Software Readers Primary Markets Government Retail Healthcare Education Corporate US Gov PIV EU Parliaments National ID Licensing Corrections Airports Passports Managed Access Loyalty Gift Cards Club Membership Employee ID Access Control Two Factor Authentication Time & Attendance Student ID Library Debit Services Employee ID Facility Access Data Access Time & Attendance Biometrics Parking Control Cards Printers Controllers Software Readers

New Solutions for Secure Identity HID Global New Solutions for Secure Identity Need similar graphic but need to replace the OMNIKEY 3121 with a 5321 and an iCLASS card being held over the reader. 7

Executive Overview HID on the Desktop™ (HOTD) is a suite of solutions designed to strengthen the overall security of a Microsoft Windows desktop log-on by using Two-Factor Authentication. Two-Factor Authentication: something the user has (their HID card), and something that the user knows (the PIN associated with that card) A more secure solution then username/password that is typically used today

Why HID on the Desktop? Over 500M HID Cards active worldwide Unique position to add more functionality Natural extension of security at the door Already using the card for ID and access Address a problem that most organizations deal with on a daily basis Users already comfortable with card No need to train on new technology Easy to deploy Limited risk 50% of the solution is already in your customer’s hands today!

The Value Proposition Open Doors. Open Windows®. HID customers have enjoyed the ease of opening doors with contactless cards for decades… HID on the Desktop™ brings that same convenience to opening Windows® Open Doors. HID customers have enjoyed the ease of opening doors with contactless cards for decades

HID on the Desktop Convenient – ATM like transaction for PC logon Secure – Password replacement solution that enforces two-factor authentication at the desktop Cost Effective

Current Strong Authentication Landscape Username and Password Status Quo – Do nothing Analysts say that using passwords can cost $ 65 - $ 120 per user, per year Biometrics Fingerprint or Facial Still have not been able to deliver enterprise ready solutions for authentication at a cost effective price point One Time Password Tokens $50 to $100 per user Three Year agreement Typically used for REMOTE authentication only PKI using Contact Smart Cards / eTOKEN PKI based using contact smart card or USB Stick with SIM $ 50 plus software Have to carry additional device ( USB Stick or 2nd Card )

HOTD Unique Selling Points Market Focus When Compliance Matters HIPAA / HITECH Act CJIS Criminal Justice Information System Shared Workstations User Roaming Market Verticals Healthcare Manufacturing Police & Local Government Energy and Utilities Colleges and Schools Simple To Deploy And Easy To Use Convenient Compliance Customer Value

HID on the Desktop - Value Proposition Convenience - Users are able to log-on to their computers more easily Compliance- When compliance matters for audit, PCI, SOX, HIPAA / HITECH Act Improved risk management - IT will significantly reduce the probability of a security breach with limited stress on their resources Security at a low TCO - Companies will have a more secure system with lower investment and low maintenance cost

Physical / Logical Convergence End users want a single credential that supports both physical and logical access control requirements. Organizations are seeking: Meeting Compliance requirements Minimizing Risk Increased convenience for end users A higher level of security Simplified card management Overall cost savings

Recent Market Study July 2010

HID Global lead generation HID Global, in conjunction with CSO magazine, is driving awareness in the IT space regarding our converged solutions

The Components A New Solution for Secure Identity The Components HID on the Desktop requires only three components: Cards Prox, iCLASS, MIFARE, DESFire and/or Crescendo cards Crescendo cards use middleware or a Microsoft mini driver included with the card. Desktop Readers 125 kHz (Prox Only Readers) 13.56 MHz (iCLASS Only Readers) Or Combined Contact/Contactless Readers naviGO Software Provides the management and provisioning of cards used on the desktop. naviGO is equivalent to access control software that manages and provisions cards used at the door. A New Solution for Secure Identity

The Corporate Environment Employee Microsoft Active Directory Corporate Network PC or laptop MIIS Web Portal Microsoft Certificate Authority naviGO Server smart card reader smart card reader

The Cards The Components HID cards for Physical and Logical Access HID Prox 125 kHz card and tags Read only card uses unique number to identify user. Number is combined with a PIN for strong-authentication iCLASS 13.56 MHz cards and tags Read/Write card uses mutual authentication between the card and the application. Card validates mutual key and securely transmits serial number, token data and token hash value to the application. Values are matched with PIN for authentication. Crescendo Multi-Technology card combines Prox & iCLASS technology with a contact chip Middleware included Card transmits digital certificate from trusted CA and validates PIN on card. If valid, user is logged on using key exchange.

Two major contactless technologies HID Technology 101 Two major contactless technologies 125 kHz ( HID Prox ) Legacy 20 years old 13.56 MHz ( HID iCLASS ) or ( Mifare or DesFire ) New industry standards Always go with iCLASS if they do not have a solution in place There are some notable differences between how HID technology is used for Physical Security versus Logical Security

Smartcard Technology Contactless 13.56 MHz Chip - iCLASS® - MIFARE® 125 kHz Prox Contactless Chip Contactless Antennae Contact Smart Chip With or without applet

Two Types of Crescendo Cards MICROSOFT ® – Plug and Play Supports Microsoft Mini Driver Program Requires no middleware installation as support is built into Microsoft Operating Systems C200 Ask Microsoft on .NET vs. JAVA cards……..Is it an issue Supports PKCS#11 and MSCAPI third-party based applications Supplied pre-initialized with the required on-card software No per-seat middleware licenses required C700

Crescendo Summary If an organization decides to implement a Microsoft Certificate Authority based PKI for logical access control, HID’s Crescendo™ smart card delivers the most cost effective, single badge solution, available on the market today. Off the shelf card, short lead times, low minimum order quantity Secure – Standards based Flexible – works with multiple applications Affordable – Lowest TCO for a single badge multi-technology solution Replace expensive OTP solutions that provide limited benefits Works with MS ILM / FIM or HID’s naviGO CMS software Future Proof your ID Badge

Dell Embedded Reader HID /Dell partnership delivered the first ever embedded contactless technology in a laptop in 2008 Dell® Latitude™ E-Family Laptops include 13.56 reader technology in palm rest Over 3 million in the market to date HID Reader Technology Included HID 13.56 MHz E-Series Z-Series

OMNIKEY Readers More specifics in the following slides

Logical Access Readers HID OMNIKEY 3-Series Contact Desktop HID OMNIKEY 4-Series Mobile Overview: The Product Category slide provides the audience with an overview of this major Product Category Fields in brackets (e.g., “<Product>”) should be modified by Product Marketing only Between 2 to 5 photographs (i.e., product shots, customers using the product; NOT icons) should be used on the top half of the slide and not descending below the horizontal half-point of the slide. The three sample images above should be replaced with actual product shots for the actual Product Families for this slide. Photos of the product should be in 2 x 3 aspect ratio (i.e., standing rectangle) to match the look of the HID Global website (Note: Square is also acceptable) Borders of the photos should be 2 point solid lines colored as “Dark Blue, Accent 2, Lighter 25%” to match the HID Global logo (Note: No border is also acceptable) Underneath each photo is a single, centered sentence describing the individual product categories in terms relevant to customers Underneath each high level descriptor should be a short list containing the Target Customer Segment and 2 to 3 value proposition statements Custom Animation used is “Ascend” where the photo, high level descriptor, and individual value propositions rise automatically for each column We want to anchor the broad differences between the Product Families throughout an entire Product Category here Corporate customers Highly reliable Easy to install and use Travelling Business User High-speed Card Access Mechanical robust 27

Logical Access Readers HID OMNIKEY 5-Series Contactless Desktop HID OMNIKEY 6-Series USB Dongle Reader HID OMNIKEY 7-Series Biometric Overview: The Product Category slide provides the audience with an overview of this major Product Category Fields in brackets (e.g., “<Product>”) should be modified by Product Marketing only Between 2 to 5 photographs (i.e., product shots, customers using the product; NOT icons) should be used on the top half of the slide and not descending below the horizontal half-point of the slide. The three sample images above should be replaced with actual product shots for the actual Product Families for this slide. Photos of the product should be in 2 x 3 aspect ratio (i.e., standing rectangle) to match the look of the HID Global website (Note: Square is also acceptable) Borders of the photos should be 2 point solid lines colored as “Dark Blue, Accent 2, Lighter 25%” to match the HID Global logo (Note: No border is also acceptable) Underneath each photo is a single, centered sentence describing the individual product categories in terms relevant to customers Underneath each high level descriptor should be a short list containing the Target Customer Segment and 2 to 3 value proposition statements Custom Animation used is “Ascend” where the photo, high level descriptor, and individual value propositions rise automatically for each column We want to anchor the broad differences between the Product Families throughout an entire Product Category here Corporate customers Broad contactless standards support High-speed Card Access Traveling users Convenient Dongle Formfactor Easy to install and use Corporate customers Biometric and card integration Ease of use 28

HID’s OMNIKEY 3-Series Contact Desktop One reader for all contact cards Works with virtually any contact card No hassle by using different cards Freedom of choice for the customer on card system One reader to be used for different applications and cards Easy integration on PC/SC interface All drivers are fully PC/SC 2.0 compliant Standard software can access the reader immediately Exchange of readers can be easily done without changing the Software One driver works with all devices of the series High-Speed Card Access Supporting fast access to cards Reduced logon times Less waiting time before use and low transaction times Overview: The individual Product Family slides provide the audience with an overview of each Product Family Fields in brackets (e.g., “<Product Family>”) should be modified by Product Marketing only The focus here is the Features, Advantages and Benefits (FABs) for each Product Family The photo from the Product Category slide should be copied and pasted here in the exact same size and placed on the left side of the slide. The sample image above should be replaced with the actual product photograph for the Product Family on this slide. There should be a minimum of 2 and a maximum of 4 sets of Features, Advantages and Benefits (FABs) on the right side of the slide Custom Animation used is “Ascend” where the photo and first Major Benefit Statement rises automatically, followed by the next sections rising on a click 29

HID’s OMNIKEY 4-Series Mobile One reader for all contact cards Works with virtually any contact card No hassle by using different cards Freedom of choice for the customer on card system One reader to be used for different applications and cards Easy integration on PC/SC All drivers are fully PC/SC 2.0 compliant Standard software can access the reader immediately Exchange of readers can be easily done without changing the Software Robust housing for mobile use Stainless Steel case Reader can remain in Notebook Mechanical stability makes it ideal for long-term mobile use Overview: The individual Product Family slides provide the audience with an overview of each Product Family Fields in brackets (e.g., “<Product Family>”) should be modified by Product Marketing only The focus here is the Features, Advantages and Benefits (FABs) for each Product Family The photo from the Product Category slide should be copied and pasted here in the exact same size and placed on the left side of the slide. The sample image above should be replaced with the actual product photograph for the Product Family on this slide. There should be a minimum of 2 and a maximum of 4 sets of Features, Advantages and Benefits (FABs) on the right side of the slide Custom Animation used is “Ascend” where the photo and first Major Benefit Statement rises automatically, followed by the next sections rising on a click 30

HID’s OMNIKEY 5-Series Contactless Desktop Dual-Interface readers for both technologies Works with virtually any contact and contactless card No hassle by using different cards Freedom of choice for the customer on card system One reader to be used for different applications and cards Supporting three ISO standards and industry leading technologies in OK5321 Supports 14443 A+B and ISO 15693 Best card support with highest possible card speed in standard NXP MIFARE, HID iCLASS, TI Tag-It, Infineon My-D and NXP iCode support allows one reader for a lot of applications Supporting HID iCLASS and Prox technology Only PC/SC compliant reader family that supports HID iCLASS technology and HID Prox technology Use of physical access credential on the desktop for different applications with OK5321 and OK5325 Overview: The individual Product Family slides provide the audience with an overview of each Product Family Fields in brackets (e.g., “<Product Family>”) should be modified by Product Marketing only The focus here is the Features, Advantages and Benefits (FABs) for each Product Family The photo from the Product Category slide should be copied and pasted here in the exact same size and placed on the left side of the slide. The sample image above should be replaced with the actual product photograph for the Product Family on this slide. There should be a minimum of 2 and a maximum of 4 sets of Features, Advantages and Benefits (FABs) on the right side of the slide Custom Animation used is “Ascend” where the photo and first Major Benefit Statement rises automatically, followed by the next sections rising on a click 31

OMNIKEY 5321CR OK5321CR Robust waterproof and dustproof casing Certified IP67 Stylish design – looks like an iCLASS, MIFARE, MIFARE Plus, DESFire Easy to keep clean and sterilize Healthcare, Clean Rooms Retail, Hospitality Manufacturing Schools Overview: There are two styles of Product Category Roadmap slides. Depending on the level of detail that is required, either this slide or the previous slide can be used. This Product Category Roadmap slide(s) provides a more extensive look for your roadmap where you can provide the audience with an overview of a single, major product deliverable coming soon with more complete detail. Fields in brackets (e.g., “<Product Category>”) should be modified by Product Marketing only Only 1 icon (e.g., conceptual drawing, contextual image, sketch; NOT a photograph) should be used on the top half, upper left of the slide and not descending below the horizontal half-point of the slide. The sample icon above should be replaced with an actual icon that can represent the Product Family Roadmap items showcased on this slide. Icon should be in 2 x 2 aspect ratio (i.e., square) Icon should have no borders To the right of the icon is a single, centered sentence describing the enhancement in terms relevant to customers with a broad timeline included. Note that the delivery date shown should be stated in 6 month windows (e.g., “(1st Half 2010)”) and be shown in red text. Underneath the icon should be a more extensive list of statements describing why we are building this enhancement, what is driving the development, and what the customer can expect Custom Animation used is “Ascend” where the icon and enhancement statement rise simultaneously, followed by the individual statement block with a click We want to provide a general direction as to where the Product Category is going 32 32

HID’s OMNIKEY 6-Series Dongle Reader Convenient Form-Factor for Mobile use Small and lightweight, but full featured Easy to store and carry Intelligent solutions for card holding Key ring attachable Easy integration on PC/SC interface All drivers are fully PC/SC 2.0 compliant Standard software can access the reader immediately Exchange of readers can be easily done without changing the Software Works with the same driver as the correspondent Desktop readers High-Speed Card Access Supporting fast access to cards Reduced logon times Less waiting time before use and low transaction times Overview: The individual Product Family slides provide the audience with an overview of each Product Family Fields in brackets (e.g., “<Product Family>”) should be modified by Product Marketing only The focus here is the Features, Advantages and Benefits (FABs) for each Product Family The photo from the Product Category slide should be copied and pasted here in the exact same size and placed on the left side of the slide. The sample image above should be replaced with the actual product photograph for the Product Family on this slide. There should be a minimum of 2 and a maximum of 4 sets of Features, Advantages and Benefits (FABs) on the right side of the slide Custom Animation used is “Ascend” where the photo and first Major Benefit Statement rises automatically, followed by the next sections rising on a click 33

OMNIKEY 6221 MicroSD Contact Smartcard reader with USB interface Supports ISO 7816 Smartcards with T=0, T=1 protocol in SIM-size format Fast Smart Card interface up to 420kbps Standard PC/SC 2.0 Driver with Hot Plug Enabler MicroSD memory card reader Support MicroSD and MicroSDHC standard of up to 32 GB memory High-speed USB interface of up to 480Mbps Supported platforms Windows 7/XP/Vista/2000 Windows 2003/2008 Server Windows CE, Mobile Linux, MacOS X 10.5 /10.6 (planned) Other platforms through CCID compliance

OMNIKEY 2061 Bluetooth With the OMNIKEY 2061 Bluetooth you get a high-performance reader, which allows you to use contact cards without being tied by a cable to your PC-Host or mobile device. This allows convenience for logon while carrying your security badge at all times with the reader

Every Smart Card Application Needs a Reader

naviGO

naviGO Software Simplifies strong authentication deployments. Provides the management and provisioning of Prox, iCLASS, MIFARE, DesFire and/or Crescendo cards used on the desktop. Delivers centralized lifecycle management for cards used for strong-authentication and their associated digital identities. naviGO Benefits Self-Service for PIN Unblock and Reset Ease of Use in Enrollment / Provisioning Centralized Security Policy

Prox / iCLASS on the Desktop naviGO Workstation naviGO is the password replacement solution that provides faster, easier, and more secure Windows® log-on Is an ATM-like transaction that uses two- factor authentication (Card and PIN) Provides Windows authentication with HID Prox, iCLASS, MIFARE or Crescendo Cards Enables Emergency Access through Knowledge Based Authentication (KBA) Requires replacement of MS-GINA for Windows XP or a Credential Provider for Vista and Windows 7 Workstation

naviGO User Portal

naviGO User Portal

naviGO Server Manages and provisions HID Contact and Contactless cards Benefits to the end-user Cards can roam between desktops Allows self-service unblock or reset of PINS Enables remote access with contactless card (RDP) Benefits to the IT Security Manager Supports self-service or attended issuance of two-factor authentication credentials (HID cards of any type) Can handle contactless, contact or any mixture of card types Allows centralized management of users and policies Increases system security with minimal impact to daily operations Quick and easy to install and use

Server Admin Portal naviGO Admin Portal

Crescendo on the Desktop Risk Appropriate Authentication Crescendo on the Desktop PKI LEVEL OF SECURITY iCLASS on the Desktop [Speaker Notes ‘ Authentication systems can be put on a continuum of from weak to strong authentication. User name and password are at the bottom. They’re cheap, but also offer the lowest level of security. Advanced biometrics with public key infrastructure (PKI) are the highest level of security, but they are also the highest cost. HID looks to fill a security void with iCLASS for the desktop, mutual authentication with the convenience of contactless. Prox on the Desktop User name & Password CAPABILITY 44

naviGO Implementation Options Standalone Client/Server PKI Mixed Environment Contactless logon Single credential per PC No management server - standalone deployment Recommended for lab and demo use Contactless logon Managed using naviGO Server Central policy management Supports roaming & multiple credentials per PC Contact (PKI) logon Managed using naviGO Server Central policy management Uses native Windows smart card capabilities Mixture of Contactless and Contact (PKI) Managed using naviGO Server Central policy management Offers greatest flexibility BaseCSP and naviGO Drivers for PKI Workstation (Standalone) BaseCSP and naviGO Drivers for PKI Client Side Workstation (Client / Server) Workstation (Client / Server) naviGO Workstation Software Not Required Server Side naviGO Server Software Not Required Server Server Server 45

Closing Thoughts Password management is not easy nor inexpensive (cheap) Two-factor authentication ( HID Card plus PIN ) provides greater security and convenience, than a static Active Directory username and complex password HID on the Desktop allows you to leverage your existing investments to “do more than open the door” Mix and match technologies (Prox or iCLASS), as needed, for standard desktop users, Crescendo with PKI for Laptops, or for users with higher security needs. naviGO software ties it all together and offers a migration path from username and password, to contactless, to contact smart cards with PKI

New Solutions for Secure Identity HID on the Desktop Benefits Simple Enables an extremely simplified deployment, administration, and use model Secure Two-factor authentication (card + pin) eliminates password sharing Flexible Offers self-service enrollment with multiple access modes as well as administrator driven policy creation Scalable Offers simultaneous support for up to 10,000 concurrent users Convenient Provides single means to manage multiple strong authentication methods Mix contactless and contact cards as needed Affordable Leverage existing HID deployed cards. No need to rebadge. Need similar graphic but need to replace the OMNIKEY 3121 with a 5321 and an iCLASS card being held over the reader. New Solutions for Secure Identity 47 47

HID on the Desktop Summary Expand the value of HID cards and tokens to do more than open the door through the delivery of a risk appropriate network access solution for small, medium, and large organizations.

Thank You Questions and Answers