1 eToken Solutions January 2003 www.eAladdin.com/eToken.

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

Secure Single Sign-On Across Security Domains
1 IN THE NEWS eToken is a durable USB key that serves as an inexpensive, yet extremely reliable two-factor authentication device for organizations. For.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Cerner Presentation to S&I esMD Workgroup – Industry Scan
MyProxy Jim Basney Senior Research Scientist NCSA
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
NexSentry Imaging Solutions
Digital Certificate Installation & User Guide For Class-2 Certificates.
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
McAfee One Time Password
© 2009 VMware Inc. All rights reserved View Pool Image Configuration Considerations for Gold Images around Application virtualization and performance.
1 Jack-PC Security Rev A Important!! Under NDA - Chip PC Proprietary and Confidential Information *CDC02264*
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
© 2012 SecureAuth. All rights reserved. 2-Factor Authentication and Single Sign-On in a Mobile World Thursday, December 5,
Digital Certificate Installation & User Guide For Class-2 Certificates.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
eToken Virtual and MobilePASS
eToken PKI Client Overview
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Data Encryption Overview South Seas Corporation Jared Owensby.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Certificate and Key Storage Tokens and Software
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Page Copyright Giritech A/S an – Excitor company.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
Clinic Security and Policy Enforcement in Windows Server 2008.
Chapter 10: Authentication Guide to Computer Network Security.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Week #7 Objectives: Secure Windows 7 Desktop
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Building a Fully Trusted Authentication Environment
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Product Manager, Keon PKI
Public Key Infrastructure from the Most Trusted Name in e-Security
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

1 eToken Solutions January

2 3 Good reasons to use eToken 3 Good reasons to use eToken3 Good reasons to use eToken3 Good reasons to use eToken Simple & Easy to use Simple & Easy to useSimple & Easy to useSimple & Easy to use Enhanced security Enhanced securityEnhanced securityEnhanced security Cost effective, versatile and fully mobile solution Cost effective, versatile and fully mobile solutionCost effective, versatile and fully mobile solutionCost effective, versatile and fully mobile solution Solutions and Technical Information Solutions and Technical InformationSolutions and Technical InformationSolutions and Technical Information Customers & References Customers & ReferencesCustomers & ReferencesCustomers & References Press Coverage & Awards Press Coverage & Awards Press Coverage & Awards Press Coverage & Awards About Aladdin About AladdinAbout AladdinAbout Aladdin Digital Identity Management

3 3 Good Reasons To Use eToken Simple & Easy to use Insert eToken into the USB port. Type in a simple password. Automatically logon to your application. Enhanced Security Logon requires eToken & Password (2–factor authentication). All access profile, keys and certificates are securely stored on the eToken. Secure SmartCard technology. Cost effective & fully mobile Increased ROI through improved password management. Standard USB connectivity enables users mobility and eliminates the need to install and maintain a separate reader. Standard connectivity to security systems eliminates the need to make changes to network topology or install dedicated servers.

4 Just plug in your eToken (Factor 1) And type your password (Factor 2) Without both Factors, a user cannot logon, or sign a transaction. Simple & Easy to Use Insert eToken into the USB port. Type in a simple password. Automatically logon to your application.

5 Your VPN Access Your Network Access Your Web Access Your Secure Your Computer Data Protection Your Secure Key Storage Your Secure Certificate Storage Your Secure Password Storage Your Secure Key Generation Its Your Digital Identity Organizer Simple & Easy to Use

6 Does this sound familiar? Writing your passwords on a piece of paper, keeping them in your wallet or pasting them on your computer screen. Using the same password for multiple applications so it will be easy to remember. Being annoyed when asked by your network administrator to change your password, or adhering to rigid password rules. Forgetting your password. Enhanced Security Logon requires eToken & Password (2–factor authentication). All access profiles, keys and certificates are securely stored on the eToken. Secure SmartCard technology.

7 Enhanced Security Why passwords are not enough ! A recent NTA Survey found that: A typical intensive IT user has more than 21 passwords and has 2 strategies to cope, neither of which are advisable from a security stand point; they either use common words as passwords or keep a written record of them. 84% of users consider memorability the most important attribute of a password, resulting in 81% selecting a common word as a password. 67% of all users rarely change their passwords, and 22% said they would only change if forced to do so. Source NTA Monitor Password Survey

8 Enhanced Security eToken offers advanced Smartcard security in a USB Token form-factor! eToken FeatureBenefit 2-Factor Authentication. i.e. a personal PIN and an eToken are required before authenticating. Offers very high level of security by ensuring that only an authorized person in possession of an eToken and a valid PIN can make use of it. Logical and physical protection i.e. Tamper-proof. Locks after several wrong password attempts, … Ensures that data on eToken can not be compromised if lost or attacked. Onboard sensitive key operations and secure storage of access credentials. i.e. RSA (1024-bit) PKI operations can be done onboard, including key generation Ensures that user keys and credentials are fully protected and mobile and not exposed to the hostile PC environment. Digital signatures are ultra secure. Advanced security certifications i.e. FIPS (2) and ITSEC LE4 Ensures critical security validation by experts. Standards Compliancy ITSEC LE4 FIPS /3

9 * With Turn Over greater than $500m Cost Effective & Fully Mobile Increased ROI through improved password management. Standard USB connectivity enables users mobility and eliminates the need to install and maintain a separate reader. Standard connectivity to security systems eliminates the need to make changes to network topology or install dedicated servers. META Group research shows that large organizations (*) typically have more than 75 applications, databases and systems requiring authentication. Users are also required to manage these passwords with different requirements and processes. META Group also highlights that implementation of Single Sign On technology provides bottom line benefits resulting in 32% reduction in help desk call volumes and 32% increase in security. August 2002, The Value Of Identity Management Gartner Group estimates that password-related calls to IT service desks from internal end-users average 4 per year per user. Help desk support costs range from $51 to $147 per password reset action. April 2002 Gartner Research also believes the advantages from using strong authentication has increased and the disadvantages of implementation decreased to make smartcards the way to go. Gartner Research Note Its time to get smart about smartcards. October 2001.

10 Cost Effective & Fully Mobile eToken FeatureBenefit Supports different user management systems; i.e. LDAP, RADIUS, Domain servers, Firewalls, servers… Seamless integration into the network. No need for complex implementations. Support for different types of authentication technologies, i.e. PKI, User+Password, OTP… Ensures protection of investment, ease of use and easy migration from current to future technologies. Same software support different types of hardware devices. i.e. USB Tokens, Smartcards & Readers Provides flexibility to customer needs and ensures protection of investment. Standard USB connectivitySeamless connectivity into any PC environment via USB port. No additional reader is required. Standard connectivity to security systems via industry standards / interfaces. i.e.CAPI, PKCS11,MS Gina… Eliminates the need to make changes to network topology or install dedicated servers.

11 Cost Effective & Fully Mobile eToken; the ultimate authentication solutions! Simple to use and administrate. Only1 password to remember. Changes to network topology or addition off an additional authentication server are not mandatory. No battery required. Fully portable. Highly secure.

12 No USB port in front? Use a simple extension cable Versatile & Mobile: Connect from any PC Cost Effective & Fully Mobile Simply chose your preferred form- factor or mix and match! * eToken is also available in a traditional Smartcard form- factor.

13 Cost Effective & Fully Mobile eToken SiSO Solutions Standard SSO Solutions Quick to deploy YesNo Easy to maintain YesNo Multiple application support YesLimited Total Cost of Ownership Medium - LowHigh Required back-end server and integration NoYes eToken - Simple Sign On (SiSO) compared to Standard SSO Identity management technologies such as PKI and SSO will win a significant chunk of IT security spending. 17% of European firms plan to implement PKI, and 14 percent plan to implement SSO in the next 12 to 36 months. (IDC, 26 Nov 2002)

14 Solutions & Technical Information Increase your business New services to your customers! Secure your network Protect your corporate network and employees! eToken Secures Your Business

15 Strongly authenticate users –Enable access only to authorized users. Digitally sign business transactions –Prove non-repudiation. –Ensure integrity of transactions and information. Authenticate Digitally Sign Solutions & Technical Information With eToken You Can!

16 eToken Enterprise PKI Solutions Network Logon WSO eToken SDK Development APIs. –Win 32, 16 Bit PCSC, CAPI, PKCS11, Linux, FreeBSD Solutions & Technical Information eToken Solutions

17 eToken For PKI Solutions Solutions & Technical Information eToken Enterprise Solutions eToken for WSO Solutions eToken For Network Logon eToken Simple Sign On (Coming Soon)

18 eToken PRO (Siemens / Infineon) Advanced Smartcard Technology eToken R2 Secure & Encrypted EEPROM+ 120-bit DES-X OR Smartcard Chip inside Solutions & Technical Information Device Options

19 Advanced Smartcard chip technology, with on-board crypto processing RSA 1024, 3xDES, SHA-1. Secure on-board key generation and storage of PKI keys and certificates. Private keys never leave the eToken. Enforceable password retry counter, 3 to15. Password quality check and enforcement. 16 & 32 KB memory models with protected Serial ID. Tamper evident & water resistant shell and tamper proof chip. 10 year memory data retention. Standard support for security APIs: CAPI, PKCS#11 and Siemens-Infineon APDU. Infineon SLE66 Chip certified ITSEC-LE4 Siemens CardOS M4- certified ITSEC LE4 FIPS (2&3) compliancy Solutions & Technical Information eToken PRO Specs

Token Management System (TMS) Windows Network Logon (GINA )v Web Sign On (WSO) Simple Sign On (SSO) CAPI / PKCS#11 / CTAPI / PCSC / APDU PKI client Bio API – MOC Bio - finger print sensor Java Cards eToken R2 eToken PRO PRO Smartcard Secure Flash Memory Proxi mity Coils Mobile phone Next Planned - Currently Available - CP SAA SPP App SPP PC Security SPP sec Applications Plugg-ins Management API s Tokens / Devices Managmnt Utilities Network Logon Manager CP SAA Manager Solutions & Technical Information Solution Architecture

21 Customers & References

& 2002 Coverage Press Coverage & Awards

23 eTokens portability and security provide not only a method to ensure powerful data integrity, authentication and encryption, but also a convenient way of gaining peace of mind by carrying your digital identity with you. Aladdins eToken provides powerful network & e-business security through a convenient USB token that can be carried on a key chain… eTokens fully portable USB device offers a cost-effective method for authenticating users when accessing a network, and for securing electronic business applications. Paul Robinson, SC Magazine Winners, Best Security Device 2 Years Running 2001, 2002 Press Coverage & Awards

24 Founded:October, 1985 Founded:October, 1985 Employees:350 worldwide Employees:350 worldwide 2001 Sales:$45M 2001 Sales:$45M NASDAQ:ALDN as of Oct NASDAQ:ALDN as of Oct Customers: Over 30,000 worldwide Customers: Over 30,000 worldwide HQ in Israel HQ in Israel Aladdin USA Aladdin USA Aladdin Germany Aladdin Germany Aladdin Holland Aladdin Holland Aladdin UK Aladdin UK Aladdin France Aladdin France Aladdin Japan Aladdin Japan Company Overview About Aladdin