The only SAP ® -certified fingerprint authentication, identity and risk management for SAP ® systems Bulletproof SAP ® security at your fingertips! Marketing.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

Travel and Expense Management Scenario Overview
Digital Certificate Installation & User Guide For Class-2 Certificates.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Digital Certificate Installation & User Guide For Class-2 Certificates.
S.NO.COMPARISON BETWEEN SAFEKHATAOFFLINE ACCOUNTING SOFTWARE 1 Completely hosted accounting information in the cloud Susceptible to computer/server.
BalaBit Shell Control Box
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Information Technology Control Day IV Afternoon Sessions.
Dell Compellent and SafeNet KeySecure
SAP checks if USER ID & Password combination is valid. No identification. User requests Log-on, enters USER ID & Password, (not necessarily their own)!
The only SAP ® -certified fingerprint authentication, identity and risk management for SAP ® systems © 2011 realtime North America Inc., Tampa, FL. All.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Auditing Computer Systems
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Travel and Expense Management Scenario Overview
Copyright © 2006 Exportech Portugal. All rights reserved.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
© 2007 realtime North America, Inc. 1 These are additional slides that can be added to the main Presentation on an individual basis:
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Security, Privacy, and Ethics Online Computer Crimes.
Sarbanes-Oxley Compliance Process Automation
Security Controls – What Works
Nevada Digital Summit David Podwojski Director, Public Sector Citrix Systems, Inc.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
I n t u i t C o n f i d e n t i a l 1 Tech BizSolutions GovCalc™ System Solution Introduction 1/29/10 Mike Anderson, VP Marketing, ,
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Integrated Security Solutions © 2006 TK Consulting, LP realtime Confidential March 11, 2007 APM Demo.
IdentiTrip 2006 Our Skills Making your Job Easier.
General Awareness Training
Unify and Simplify: Security Management
The Islamic University of Gaza
BioL ock Dem o - Intro ducti on bioLock Technical Demo at SAP Public Sector for Sapphire bioLock controls the access to one or multiple SAP systems via.
We present APM - Authorization and Profile Management.
PASBO Conference 3/14/ School District Business Operations – Efficiencies and Internal Controls Matthew J. Malinowski Business Manager Susquehanna.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Facts about IT Security 1. Data theft is a rapidly growing crime 2. Intruders target user profiles with extended authorizations 3. Profiles are protected.
Biometric Security for Any Transaction or Function within SAP for Clear Accountability Cyndi Wolf, Polk County Public Schools Thomas Neudenberger, realtime.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Ultimate Data Loss Prevention, Risk and Compliance © 2006 TK Consulting, LP bioLock
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
SHERRYANNE MEYER [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2000 ANUP MAHESHWARI [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2008 AJAY VONKAREY [ ASUG INSTALLATION.
Unit 9: Electronic Fraud Professor Thomas Genovese.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
MBA 664 Database Management Dave Salisbury ( )
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
1 Transitioning TAC I/A Series ™ to SmartStruxure ™ solution 11 June 2016.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
iSecurity Compliance with HIPAA
Dell Compellent and SafeNet KeySecure
Jabil Circuit: Monitoring Users with 95% Less Data Review with SAP® Access Violation Management by Greenlight Objectives Monitor segregation-of-duty (SoD)
Critical Security Controls
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
e-Invoice I e-Archive I e-Ledger
County HIPAA Review All Rights Reserved 2002.
Automated Bulk Signing Solution
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

The only SAP ® -certified fingerprint authentication, identity and risk management for SAP ® systems Bulletproof SAP ® security at your fingertips! Marketing Overview © 2011 realtime North America Inc., Tampa, FL. All Rights Reserved.

Founded in 1986 by former SAP ® managers Certified software, services & special expertise partner Specializing in governance, risk and compliance (GRC) Serving many industry sectors including food, pharmaceutical, chemical, automotive, aerospace, defense, engineering, government and more Flagship software product, certified by SAP ® since 2002 is Bulletproof SAP ® security at your fingertips! Who is realtime?

Selected realtime clients 3M, AIRBUS, Alcan, BASF IT Services B.V., Bayer, Bayer CropScience, Brevard County Government, California State University, Campbell's, GlaxoSmithKline, Harman Kardon Music Group, Krupp Bilstein, Linde, Loewe Opta, Marathon Oil, Océ Document Technologies, Polk County School District, Purdue Pharma, Siemens, ThyssenKrupp Michigan, Toyota, United States Army… Over 200 global clients served!

What were these users looking for? was developed to provide these benefits demanded by users: Dramatically increase SAP ® security capabilities Manage user identities via indisputable biometrics Control access to functions down to the field level Enforce true Segregation of Duties (SoD) Ensure meaningful compliance with: Sarbanes-Oxley, HIPAA, ITAR and more

Is your system bulletproof? Standard Version + Bulletproof VersionBulletproof Protection Standard Protection

According to the ACFE’s 2010 Report to the Nations on Occupational Fraud and Abuse, based on global data, organizations lose about 5% of annual revenue to fraud. Schemes can go undetected for years and frequently involve first-time offenders. Association of Certified Fraud Examiners #1 Risk: Fraud is a growth industry

Risk of Financial Fraud? HIPAA Compliance? Sarbanes-Oxley (Section 404)? ITAR? Industrial Espionage? Other regulations? Are you concerned about…

Financial loss? Negative publicity? Lawsuits? Loss of intellectual property? Decline in stock price? How would an incident affect you?

Are you still relying on this? User password SAP ® Software Passwords are written down, borrowed, stolen, misused Provides “perimeter” security but no additional layers! Traditional SAP ® log-on process uses passwords

Biometric technology offers the highest security Fingerprint Scan = Maximum Security

How to Bulletproof your system: SAP ® log-on profiles are enhanced with fingerprint interface User is prompted via bioLock software as shown above Various hardware devices can be used to securely scan fingerprints - while protecting users’ privacy! SAP ® Software Encrypted scan User’s fingerprint X

What devices can verify user identity? Plus one of these … (optional) + Potential Future Development

bioLock is compatible with over 80 laptops (with built- in fingerprint sensor) and over 50 independent devices like mice, keyboards, or PCMCIA Cards. is hardware independent is hardware independent Cherry ID Mouse Convenient Touch Sensor bioLock ID Mouse Powered by Secugen Leading Laptops 23% have Swipe Sensors Secugen Hamster FIPS 201 Compliant UPEK Eikon Low-cost Device Cherry Keyboard Smart Card Option Zvetco P5000 High End Device

log-on & system access with SAP ® log-on & system access with Logon authorized Logon blocked  Logon bioLock checks authentication rules bioLock user/ function bioLock prompts you for fingerprint Fingerprint comparison with table bioLock templates bioLock identifies unique points (minutiae) within a fingerprint and creates an encrypted, digital template – no images of fingerprints are ever stored! Note:

5 Extra Levels of Security “Bulletproofing” with I)Authenticate user log-on based on fingerprint II)Lock down any transaction (e.g. SE38 or ME21N) III) Protect “infotypes”, fields, buttons according to customizable profiles (e.g. HR infotype 167) IV) Require authentication if a field value exceeds a trigger amount (e.g. a transfer > $10,000) V) Require dual user authentication for critical SAP ® functions, viewing sensitive data or intellectual property Existing SAP® Security Consists of Password Log-On

Perimeter Security - Level I Transactions – Level II Fields - Level III All levels can be controlled using fingerprint scan! Bulletproof Security requires 5 Levels Financial Limits – Level IV Dual Approval – Level V

Log-on to a Profile (e.g. Admin) Transactions (e.g. HR / PO / Finance) Infotypes (e.g. 008/167 etc.) Buttons (e.g. Print / Export / Execute) Display (e.g. Balance Sheet) Execute (e.g. prevent execution of anything…) Tables within SE16/SE16N Programs within SE38 Values (e.g. wire transfer of a certain amount) Screens (e.g. export control / ITAR ) Dual Authentication Mask Fields (e.g. make data invisible) Example – Masking Field Data: Multiple Control Points per User

bioLock will always identify and log the uniquely authenticated, actual users – independent of their SAP User profiles Sometimes multiple users share workstations, for example: Hospitals, Warehouses, Financial Institutions, etc. Due to time constraints, logging on/off is impractical, but re-authentication via fingerprint scan is practical. bioLock allows all users to authenticate on all workstations at the beginning of a work session, using only fingerprint authentication after the initial verification. Fast User Switching

Example: Who Has Access? External Employees Former Employees Hackers Criminals The threat comes from the inside and outside! Consultants Auditors 6,000 Named SAP Users 2,000 Users with potential access to critical data 1,000 Users with restricted roles to critical functions Fraud is mostly committed by stealing or cracking a password to access profiles with critical, extended authorizations VIP Only: 500 Permitted bioLock Users for most critical functions Bulletproof Data Protection

Unaffected by SAP ® versions or upgrades Existing SAP ® passwords and authorizations are unchanged Compatible with all SAP ® versions from 4.x onward Profiles are 100% customizable on a user-by-user basis You decide what aspect of your system needs to be protected and how stringently! - Seamless Integration Bulletproof bioLock Security

Only a minority of users are enrolled, depending on their security risk profile and management’s policies One-time user enrollment takes only a few minutes Use is very intuitive, no training required Ongoing use consists of occasionally providing a fingerprint scan – each user profile can be unique Fingerprint images are never stored – privacy is protected What is the impact on users?

User is prompted for a fingerprint scan to complete log-on (Security Level I) User logs on using their SAP User Profile and password Example – what a user sees…

User selects the transaction “ME21N” to create a purchase order NOTE: This could be virtually any R/3 transaction such as SE16 or SE38 User is prompted for a fingerprint scan to complete the activity (Security Level II) Example – what a user sees…

Infotype 167 (field level) is protected for HIPAA compliance, so user is prompted for fingerprint scan (Security Level III) User attempts to look up Health Plan information under Infotype 167 Example – what a user sees…

Installation is done by simply downloading bioLock transports into its own /realtime namespace within SAP ®. bioLock is compatible with SAP ® 4.x and higher, and is unaffected by version upgrades. Configuration and training is done in several days with the support of realtime consultants or partners. Roll-out to selected users can be done quickly, slowly or in phases as desired, or even by automated installation. As users are activated, a fingerprint scanning device is installed at their work station. A robust audit trail is automatically generated within SAP ®. - What is the impact on IT?

Log File Enhanced activity logging Sorted by error / threat category Audit trail is greatly enhanced Example: Unauthorized attempt to log on with another user’s Password SAP USER user profile… …and the REAL USER as identified by fingerprint

Sample Success Stories - Achieve compliance with HIPAA by protecting private employee / HR information Ensure proper approvals for purchasing by automating workflow with external browser access for senior executives International bank prevents fraud with dual authentication and strong financial controls, masking data from unauthorized viewing School Board prevents payroll and personal expense fraud which went undetected for years European power plant protects all purchase orders and workflow for several thousand users

Benefits of The entire installation and configuration of bioLock can be done quite rapidly. Only minimal training is required, and the impact on both users and IT support staff is minimal, both during installation and in use. Since bioLock is certified by SAP ®, ongoing compatibility with different versions is assured. In a very short time, you can start enjoying benefits such as: 1.Dramatically increased SAP ® security capabilities 2.Manage users ’ identities via indisputable biometrics 3.Control access to functions down to the field level 4.Enforce true Segregation of Duties (SoD) 5.Attain meaningful compliance with SOX, HIPAA & ITAR Statistically, a starter package could cost less than a single fraud incident.

bioLock is SAP certified - SAP certified since SAP ® certified since 2002 Visit:

realtime North America, Inc. WORLD TRADE CENTER 1101 Channelside Drive, Tampa, FL T: F: Web: Martin Lum Director of Business Development, Northeast Please contact us for a demonstration or pilot installation: bioLock