Discover the future of security on www.cidway.com Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
B-CERB complete protection against phishing copyright 2008 by Wheel.
Credit Card Operations Bülent Şenver
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Everyone is going Wireless - VoIP is no exception Sanjit Chatterjee Director – Global Marketing
McAfee One Time Password
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Your Mobile Solution©2012 Mocapay | All rights reserved. Merchants Go Mobile Doug Dwyre | CEO |
Adding SMS functionality to WhatsUp Gold
XProtect ® Professional Efficient solutions for mid-sized installations.
4/6/ :35 AM © 2004 Microsoft Corporation. All rights reserved.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Mobile Monetization. TIMWE at a glance 2 Overview Offered Solutions 3 TIMWE Solutions TIMWE Services Mobile Marketing Mobile marketing campaigns and.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Real Security InterSwyft Technical information's.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
More than You Want to Know About Pocket PC’s. What is a Pocket PC?
Two Factor Authentication On Mobile, Solution for tomorrow? Nicolas Fort, Product Manager Solution for today !
Key Technology Enablers for Mobile Value-Added and Content Services - MMS, Java and XHTML OFTA Hong Kong, Marko Keskinen Nokia Mobile Phones.
Smart Phones Deserve Smarter Content. Overview 1. What is Handango InHand? 2. How do I get my apps sold through InHand? 3. How can I get my own developer.
CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SCOM 2007.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
376 Powder Springs Street Suite 140 Marietta, GA Phone: ©2009 Anderson Taylor. All rights reserved. Online Portal & Mobile Application.
By Hinal Pithia Monday, November 14, Overview The traditional wallet The digital wallet –How it works –Technology –Payment Models –The players –Considerations.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Copyright © 2002 ACNielsen a VNU company 3CX Partner Training December 2007.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
What Are the Different Platforms for Enterprise Mobility Solutions?
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
CLOUDENTIFY.
Curriculum Vitae Builder by Egomnia is a Powerful Office 365 Application Designed for Word That Enables Guided Creation of Professional Resumes OFFICE.
The time to address enterprise mobility is now
Utilize Internal Data via Mobile Business Apps
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Strong Authentication and Single Sign-On (SSO) for Health Care
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Workflows that Span Teams, Systems & Data Sources
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Discover the future of security on Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool

Copyright © 2008 CIDWAY Security SA. All rights reserved – A few words on CIDWAY Swiss company based in Lausanne, Switzerland Over 10 years of experience in authentication and digital signature International network of strategic partners and resellers Presence in over 30 countries Unique proprietary patented technologies for mobile phones and Homeland security

Copyright © 2008 CIDWAY Security SA. All rights reserved – Addressable markets BankingHomeland Security Mobile applicationGovernmentHealth Corporate

Copyright © 2008 CIDWAY Security SA. All rights reserved – Business applications E-Banking E-Commerce E-Government E-Brokerage E-Health care E-Gaming E-Lottery E-Government E-Loyalty M- Payment Application Security for Customer security Remote Access Network Security Enterprise Security for Employee security All companies requiring authentication under own brand name OEM (Original Equipment Manufacturers)

Copyright © 2008 CIDWAY Security SA. All rights reserved – Product portfolio overview GAIA SDK Authentication platform SDK GAIA Server Authentication platform SESAMI Mobile Time based OTP Software token for mobile phones SESAMI Mobile SDK Token SDK for mobile phones SESAMI Slim Time based OTP Hardware token SESAMI SMS SMS based OTP for mobile phones One single authentication platform to answer all security needs and user profiles.

Mobile phones and their impact on our lives CIDWAY Security SA

Copyright © 2008 CIDWAY Security SA. All rights reserved – By 2015, more that 2 billion people will be using mobile wallets – software that enable consumers to manage their money, including making and receiving payments, using their mobile phone. Edgar Dunn & Company, billion

Copyright © 2008 CIDWAY Security SA. All rights reserved – Revealing behaviors While going to work, you realize that you forgot your wallet and mobile phone. What would you do? 47% of surveyed people would turn back for the wallet 83% of surveyed people would turn back for their mobile phone!

Copyright © 2008 CIDWAY Security SA. All rights reserved – THE RED DOT EFFECT The mobile phone is becoming an essential part of our professional and personal lives. Explosion of mobile services and requirements: Work ( , agenda, remote access, notes, etc.) Communication (conversations, VoIP, etc.) Social network (SMS, MMS, Facebook, chat, etc.) Purchase and payment (parking tickets, ski pass, etc.) Finance (e-banking, billing, etc.) Loyalty programs (vouchers, special offers, etc.) Entertainment (games, broadcasting, etc.)

Copyright © 2008 CIDWAY Security SA. All rights reserved – But identity theft is also increasing… Most of our identity data and personal details are duplicable, reproducible and reusable. Statistics show that overall common attacks will double each year. Common attacks are: Brute force PIN predilection Keyloggers Password sniffers Phishing Man in the middle attack (MITM) Reverse ingeneering

Why choose mobile authentication solutions? CIDWAY Security SA

Copyright © 2008 CIDWAY Security SA. All rights reserved – Worldwide financial crisis results in cost reduction initiatives New and alternative cost saving methods are sought Security remains a key priority Market end users now looking for a product to challenge the market Mobile Penetration rates continue to increase in emerging markets Attractive price point CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software tokens. Economic crisis – Opportunity for Mobile Solutions

Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose mobile against other authentication methods Hardware tokens are secure but… o Very expensive o Not in the spirit of mobility (one token per access) o Time limited (replacement, etc.) o Not scaled for large deployments (ref. logistics, maintenance, etc.) SMS are flexible and scaled for large deployments but… o Are less secure o Subject to recurring costs o Rely on network and operators Mobile software tokens are… o Secured o Autonomous o Flexible (no limit of tokens on mobile) o Unlimited o Scaled for large deployments

Why choose CIDWAY? CIDWAY Security SA

Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Security Algorithm and Time based One Time Passwords Patented PIN protection in case of theft or loss of device (PIN is not stored on mobile or transmitted externally) Protection against any form of attacks, such as Cloning Brute force PIN Predilection Keyloggers Phishing Man in the middle attack (MITM) Reverse engineering Secured registration, activation and deployment Automatic time synchronization

Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Compatibility and integration Multi-OS Java Symbian Blackberry Windows CE & Pocket PC Palm OS Iphone Standalone or SDK mobile token & server Easy integration into 3rd party mobile applications Freedom of deployment scenarios (Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.)

Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? Rationalization of costs One device and one PIN for all your authentication needs (no need to carry different tokens) Multi-Channel Versatility (authentication, document signature, etc.) Unlimited life span (ref. software) No on-going maintenance or replacement costs Free of network and operators (no hidden costs) Up to 2/3 of cost reduction vs traditional solutions

Copyright © 2008 CIDWAY Security SA. All rights reserved – Why choose CIDWAYs mobile solutions? USER FRIENDLINESS Easy and intuitive solution Use of one familiar device Continuous evolution of software Create new added value services

Thank you Christophe Guignard –Marketing & Communication Manager Av. Juste-Olivier 11, 1006 Lausanne – Suisse Tél: – Fax: For more information, please visit