1 Passwords are Dead! Entrust IdentityGuard™ Chris Voice VP Identity Management.

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

Management Presentation February Opportunity Summary Financial Services Market Problems: –Electronic Content Needs Low Cost Payment System –Like.
B-CERB complete protection against phishing copyright 2008 by Wheel.
Compliance with Federal Trade Commission’s “Red Flag Rule”
1 Secure Vault Payments Girard Business Solutions, Inc.
Challenges of Identity Fraud Chris Voice, VP Technology.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Week 6 Lecture Part 2 Databases in Electronic Commerce Samuel Conn, Asst. Professor.
Electronic Commerce Semester 1 Term 1 Lecture 22.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
CertAnon A Proposal for an Anonymous WAN Authentication Service David Mirra CS410 January 30, 2007.
CHAPTER 10 Created by, David Zolzer, Reversed By ::Oldog Workshop::, Roger Lan E-commerce Payment Systems.
“Electronic Payment System”
PayPal as an Additional Payment Option How Merchants Can Benefit When They Accept PayPal on Their Site.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Electronic Payment Systems University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2010 March 2010 ITSS 4201 Internet.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Innovative Secure Payment Solutions John QIAN Senior Manager March,
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Copyright © 2007 Pearson Education, Inc. Slide 6-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
What is Retail Banking? Retail banking refers to banking in which banks transact directly with consumers. It aims to be the one-stop shop for as many.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Secure Mobile Banking Enabling the Collaborative Customer Experience.
Profits, Right Before Your Eyes. Instant Image Verification.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
The State of Computer & Data Security in Corporations Independent Survey.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Identity Assurance Emory University Security Conference March 26, 2008.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
PAYPAL PRESENTED TO:SIR ADNAN PRESENTED BY:SAIMA ASGHAR
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Banking and E-Commerce Group ‘A’ April 23 rd 2003.
Safe’n’Sec IT security solutions for enterprises of any size.
Protecting Your Assets By Preventing Identity Theft 1.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Electronic Banking & Security Electronic Banking & Security.
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
MOBILE PAYMENTS (“M-PAYMENTS”) August 2007 Potential impact on South African banking industry Team Galahad Lionel Diakanyo Joshua Makgate Sean Rule.
©2008 Schwab Retirement Technologies, Inc. All rights reserved. ( ) Schwab RT Web Image-Based Authentication Enrollment Enhancements Mitchell Savage.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
Protecting Your Assets By Preventing Identity Theft
ELECTRONIC PAYMENT SYSTEM
Mobile trends in the gaming industry
Conversion Optimizations Before the Holidays
Banking Services
“Credit score vocabulary”
IT Security Solutions for Banking
Presentation transcript:

1 Passwords are Dead! Entrust IdentityGuard™ Chris Voice VP Identity Management

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Entrust We are Security Specialists èIndustry pioneer & leader with 90 patents èIntegration and support for leading technology vendors èPartnerships with leading Integrators èBest in class service and technical support èStrong balance sheet with over $100M in cash and no debt

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Identity Theft Identity-Theft is the fastest growing crime in America… 10 MILLION victims in 2003 US Federal Trade Commission Losses from Identity theft cost $5 billion in 2003 (US Federal Trade Commission)

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Phishing Losses from “phishing” cost financial institutions $1.2 billion in 2003 (Gartner)

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA What do your customers think? èMarket research is based on online survey findings collected by Greenfield Online between August 16 and 20, 2004 èRepresentative sample of 10,000 respondents was taken from Greenfield Online's panel of 3+ million consumers è2,000 completed surveys made up the results from consumers in the United States, Canada, Germany and the U.K èThe confidence interval of data collected is + or – 2.2%. èWhile the data collection was conducted on behalf of Entrust Inc, at no time were the survey respondents aware of Entrust participation

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Participation in E-Commerce & On-line Banking Take-Away èSomething is preventing on-line users from participating in more sensitive / higher value transactions on-line. Do you participate in e-commerce? (on-line shopping, on-line banking, on-line travel booking, on- line bill payment, etc…) Do you bank on-line?

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA User Concern around Identity Theft Take-Away èMost users have specific concerns about on- line identity theft of users concerned about the security of on-line banking, including the possibility of your identity being stolen and someone else accessing your accounts?

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA User Reaction to Improved Security Take-Away èOn-line identity security is a barrier to up- take of on-line banking èThere is a business payback from increasing security of users who do not currently bank on-line would be willing to do so if the security of on-line banking was improved to significantly reduce the chances of your identity being stolen and account information accessed.

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA User Reaction to Improved Security Take-Away èOn-line identity security is a barrier to up- take of additional on-line banking services èThere is a business payback from increasing security of users would be likely to use additional, higher value, banking services online if the security of on-line banking was improved to significantly reduce the chances of your identity being stolen.

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Influence on User Buying Behavior Take-Away èCustomer buying behavior is being impacted by security concerns èDifferentiation based on security can be a competitive advantage of users would be likely to be influenced in selecting a bank by the protection of your identity in on-line banking. of users would be very likely to switch banks to get better protection from identity theft.

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA User Mobility What this means: èAddressing on-line identity security requires solutions that work across multiple channels Which methods do you use or would you like to use to access your banking on-line? chose more than one…

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA “I skate to where the puck will be…”

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA What is required? “When you get to the core issue of most identity theft attacks, it really falls back to needing stronger authentication ” (John Pescatore, Gartner) Prevents an attack from being successful No reliance on user education Can be deployed now

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA User Acceptance of Strong Authentication Take-Away èCustomers are ready to accept an impact to user experience to deliver increased security èA small number would not, thus any solution must be able to operated optionally of users would be willing to use a second factor of authentication if it significantly increased your security of users would be likely to leave their bank, if it required this method for log-in.

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Strong Authentication Challenge Usability & Cost Security

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Authentication Approaches Purchase & Deployment Investment Authentication Strength Passwords ? IdentityGuard èStrong second factor security èInexpensive to produce and deploy èEasy to use and support Tokens PKI Smartcards

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA èRandom authentication card issued to each user èRandom characters in grid with row/column headers èSeparate plastic card or on existing card Entrust IdentityGuard Concept – Think “Bingo” Stand-Alone CardCard Add-On

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA èAt each log-in, user presented with randomly generated coordinate request –Different for each log-in –In conjunction with existing method (ex. User name / Password) èUser looks up coordinates and enters response Authentication Process 92 AnyUser ******

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Benefits èSecure –High entropy –Resistance to brute force –Resistance to phishing èEasy to Manage –Flexible/inexpensive to produce & distribute –Long-lasting card to minimize issuance costs –Real-life recovery to maximize “up-time”

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Benefits cont’d èEasy to Use –Intuitive method –Convenient form-factor –Extensible to other channels èCost –Fraction of cost of traditional hardware authentication devices Call Center / Interactive Voice Response Mobile Devices

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Easily Fits into Current Environment End User IdentityGuard Existing Password Sign-on Application 1. Login page with randomly generated IdentityGuard challenge 2. User enters user name, password and IdentityGuard response 3. User name and password authenticated with existing infrastructure 4. User name and IdentityGuard challenge & response sent to server 5. IdentityGuard server returns authentication confirmation 6. User Authenticated Linux-based High scalability & availability

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Summary of Benefits èStrong Security èEasy to Manage èEasy to Use èExtensible èLow Cost

Copyright Entrust, Inc Entrust Confidential - Subject to Terms of MNDA Questions? Presenter Name For more information on Countering Identity Theft: