Vasco Product Portfolio Eric Gabrys – Product Manager The world ’ s leading software company specialized in Internet Security.

Slides:



Advertisements
Similar presentations
Rick Claus IT Pro Advisor Microsoft Canada Rodney Buike IT Pro Advisor Microsoft Canada
Advertisements

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Unified Logs and Reporting for Hybrid Centralized Management
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
1 Integrating ISA Server and Exchange Server. 2 How works.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Norman SecureSurf Protect your users when surfing the Internet.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Clinic Security and Policy Enforcement in Windows Server 2008.
Module 1: Installing Internet Information Services 5.0.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
VASCO Data Security 1 End Of Live VACMAN MIDDLEWARE VASCO ENTERPRISE SECURITY.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Barracuda Load Balancer Server Availability and Scalability.
Intranet, Extranet, Firewall. Intranet and Extranet.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Module 1: Server Roles and Initial Configuration Tasks
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
Internet Security for Small & Medium Business Week 6
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
X-Road – Estonian Interoperability Platform
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
E-Banking Security Summit 2007 Moscow Roger Vandeplas, VP Sales & Marketing.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Enterprise Messaging & Collaboration. e-Interact Modules.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
VASCO Data Security 1 Full option all terrain authentication Marnix L’hoëst International Distribution Manager SOUTH region VASCO ENTERPRISE SECURITY.
CLOUDENTIFY.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
CONNECTING TO THE INTERNET
Data and Applications Security Developments and Directions
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
HW and SW Solution for Black-box attacks
Goals Introduce the Windows Server 2003 family of operating systems
Check Point Connectra NGX R60
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

Vasco Product Portfolio Eric Gabrys – Product Manager The world ’ s leading software company specialized in Internet Security

2 Customer Needs roadmap Complying with regulatory (FFIEC) and business security needs Compatible with existing and future infrastructure investments. Simple and cost-effective to implement and support Easy to use Completely interoperable across banking platforms, applications and infrastructures No “silver bullet” for curing all banking security needs

3 On-line banking security « In our 2006 Financial Services consumer survey, security ranked as the No. 2 reason that consumers reported for not using online banking. » Ed Kountz, JupiterResearch, US « Nearly 2 million Americans have had their checking accounts raided by criminals in the past 12 months » survey, market research group Gartner, US « The number of recorded incidents rose 16-fold to 5,059. That led to a 55% rise in losses from online fraud against banks, reaching £23m in the first half of » Apacs, UK

4 On-line banking security Passive monitoring Key stroke logging Active interference Pop ups and injected dialogs Man in the middle attacks Selfdefense destroy anti-virus update function alter local software firewall rules establish invisibility by root kit Remote control install back door via internet install http and socks proxy Identity theft steal content of protected storage steal identities (pop3/imap) steal client side certificates install BHO to steal all https transactions install man in the middle functions

5 A concern ?

6 On-line banking security

7

8 Full Option, All Terrain Product Strategy Authentication appliances Combines Identikey with a wide variety of Internet communication solutions; Client e-signature software Combines a complete set of client e-signature and user authentication functionalities on a wide variety of platforms Authentication Services Combines all VASCO products and solutions in an outsourced service offering. Authentication server Combines the VACMAN core authentication platform with full server functionalities Core authentication platform Combines all authentication technologies on one unique platform

9 Products – current platform portfolio INCLUDES Virtual Digipass Digipass – EMVCAP - OATH Verification VACMAN Controller / VACMAN Middleware

10 Products – Digipass for Web

11 Authentication server Product Features: Web-based and command line administration MMC Administration plugin (optional) SOAP communication interfaces Reporting Token provisioning DIGIPASS for Web DIGIPASS for Mobile Phone System monitoring; Event viewer/syslog Transaction Signing functionality (DP Signatures) Server features based licensing Message Delivery Component ODBC Storage connector Platforms  Windows 32-bit/64-bit  Linux Intel 32-bit/64-bit (kernel 2.6+)

12 Authentication appliances 21 Internet Security Services: SPICT Firewall HTTP accelerating proxy and SMTP relay VPN Server Statistics and Reporting Monitoring and IPS Multiple Internet Connections Directory Integration Services Advanced Bandwidth Management (QOS) Reverse HTTP and FTP proxy Webmail interface Public, Intranet and Secure Web server Network Fax Server Public Primary DNS High Availability RAS analog per line (hardware included) RAS ISDN per line (hardware included) SSL – VPN Radius

13 Authentication Services VASCO 30mio - OTP: 60mio 1.093mio Internet Users Users of Service  End-Users: SSO using one Username/Password  Websites: Low Total Cost of Ownership OpenID:  Open, decentralized, free framework for user-centric digital identity  Not proprietary (Microsoft Passport: not successful)  Lacks trust:  VASCO will bring trust to OpenID by Trusted Parties Multi level authentication  Low and Medium level: VASCO (or Operator/ISP)  High level (Trust) through authentication by Trusted Parties

14 Products – client platform portfolio Basic pack Advanced pack

15 Multiple Applications: > e-Banking > e-Commerce > B2B > B2C > e-Government Secure connection Multiple Platforms : > Logical Security > Physical Security > … Multiple Services: > Identity Management > Fraud detection & Analysis > Statistics & Reporting > VPN > … Secure connection The world ’ s leading software company specialized in Internet Security

16 Questions ? The world ’ s leading software company specialized in Internet Security Full Option, All Terrain Authentication Company Thank you