SlideShare ist ein Scribd-Unternehmen logo
1 von 12
ARX | 855 Folsom St. Suite 939 San Francisco, CA | (415) 839 8161 | www.arx.com | sales@arx.com
Digital Signatures
Presented by:
Daniel Translateur
Sales Manager Europe
Sharon Ben-Avraham
Professional Services Engineer
Raanan Dahari
VP Sales Europe
Ari Seror
Directo of Professional Services
Agenda
About Algorithmic Research
Overview on CoSign product
CoSign for XML signatures
QA
About Algorithmic Research (ARX)
Founded in 1987
Worldwide provider of digital-signature
and data-security solutions
Our Main products:
- Cryptographic USBs and smartcards
- PrivateServer Hardware Security Module
- CoSign Digital Signature
ARX – Market Footprint
Life Sciences Engineering
Healthcare
Government
Energy, Oil & Gas
Finance
The Forrester Wave™: E-Signatures, Q2 2013
“The Strongest Digital Signature Solution”
CoSign by “ARX has the most advanced digital signature capability
in the field… easily integrates with internal security and credential
management along with a strong central administration”
“Enterprise architects should include e-signatures as part of an
overall ECM and BPM strategy… a foundational technology along
with records management, eDiscovery, and other content services.”
“Dramatic savings, successful implementation, no legal challenges”
What is a Digital Signature?
Digital signatures replace handwritten signatures for electronic documents.
Digital signature is unique to both document & signer
Digitally signed documents have legal effect and trust outside of the
organization
Document Digital
Signature
Signed
Document
+
Document
Hash
Signer’s
Private Key
Signer’s ID
+
Digital Signatures are NON-FORGEABLE
AdminUser
Directory
Built-in Key-
Management;
Private-key Ops
Built-in
Management for
Certificates (CA)
Graphic-
Signature
Management
User-management Policy (directory)
drives signature-privilege management.
Signature credentials (keys & certs)
maintained in secure appliance.Desktop Apps
Web Apps
Mobile Apps
End-
Users
CoSign = Turnkey Solution (installs in ~4 hours)
Securely Request Signature Services
Central Control over Signature
Privileges
Policy
General Deployment Architecture
FIPS 140-2
level 3 Secure
Features
Non-forgeable digital signatures
Centralized approach, follows existing user
management policies.
Secure Enclosure
Extensive 3rd party application support
Multiple authentication methods
Built-in CA
User management synchronization
Graphical signature (wet-signature)
Easy Integration with applications & systems (SAPI:
Signature API)
Flexibility & Scalability
CoSign is scalable from few users to hundreds of thousands by just
upgrading the licensing key
CoSign is flexible enough to offer easy integration with multiple with
business application and workflow processes.
CoSign allows high availability configuration - enables an organization to
setup several CoSign appliances capable of working in support of each
other to provide: Redundancy, Load Balancing, Disaster
Recovery, Elimination of long latency
CoSign Enables Choice
CoSign High Level Architecture - BOI
Client Computers
CoSign Client
XML Signing Application
CoSign Appliances
HA/LB: Optional
On premises or Cloud
Signature request
Authentication
XML Hash
Signature
response
Signed hash
Signer certificate
Questions?
Try CoSign for free today
Visit www.arx.com to get your free CoSign trial

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataPistoia Alliance
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeVishwas Manral
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimVulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimBen Bruno
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SVVishwas Manral
 

Was ist angesagt? (20)

Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Web security
Web securityWeb security
Web security
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimVulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Ngn sec
Ngn secNgn sec
Ngn sec
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SV
 

Ähnlich wie CoSign by ARX presentation financial markets

Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentPerficient, Inc.
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
CoSign Digital Signatures: General Presentation
CoSign Digital Signatures: General Presentation CoSign Digital Signatures: General Presentation
CoSign Digital Signatures: General Presentation Cisco
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+AppViewX
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
ReCheck - secure digitalization
ReCheck - secure digitalizationReCheck - secure digitalization
ReCheck - secure digitalizationrecheck
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
A passwordless enterprise journey
A passwordless enterprise journeyA passwordless enterprise journey
A passwordless enterprise journeyaccenture
 
Sirius Decisions DocuSign Vendor Profile
Sirius Decisions DocuSign Vendor ProfileSirius Decisions DocuSign Vendor Profile
Sirius Decisions DocuSign Vendor ProfileDocuSign
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...Amazon Web Services
 
16 Technical Terms Every Facilities Manager Should Know
16 Technical Terms Every Facilities Manager Should Know16 Technical Terms Every Facilities Manager Should Know
16 Technical Terms Every Facilities Manager Should KnowiOFFICE Inc.
 

Ähnlich wie CoSign by ARX presentation financial markets (20)

Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated Environment
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
CoSign Digital Signatures: General Presentation
CoSign Digital Signatures: General Presentation CoSign Digital Signatures: General Presentation
CoSign Digital Signatures: General Presentation
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 
CERT_ver-1.4
CERT_ver-1.4CERT_ver-1.4
CERT_ver-1.4
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
ReCheck - secure digitalization
ReCheck - secure digitalizationReCheck - secure digitalization
ReCheck - secure digitalization
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
A passwordless enterprise journey
A passwordless enterprise journeyA passwordless enterprise journey
A passwordless enterprise journey
 
Sirius Decisions DocuSign Vendor Profile
Sirius Decisions DocuSign Vendor ProfileSirius Decisions DocuSign Vendor Profile
Sirius Decisions DocuSign Vendor Profile
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...
 
16 Technical Terms Every Facilities Manager Should Know
16 Technical Terms Every Facilities Manager Should Know16 Technical Terms Every Facilities Manager Should Know
16 Technical Terms Every Facilities Manager Should Know
 

CoSign by ARX presentation financial markets

  • 1. ARX | 855 Folsom St. Suite 939 San Francisco, CA | (415) 839 8161 | www.arx.com | sales@arx.com Digital Signatures Presented by: Daniel Translateur Sales Manager Europe Sharon Ben-Avraham Professional Services Engineer Raanan Dahari VP Sales Europe Ari Seror Directo of Professional Services
  • 2. Agenda About Algorithmic Research Overview on CoSign product CoSign for XML signatures QA
  • 3. About Algorithmic Research (ARX) Founded in 1987 Worldwide provider of digital-signature and data-security solutions Our Main products: - Cryptographic USBs and smartcards - PrivateServer Hardware Security Module - CoSign Digital Signature
  • 4. ARX – Market Footprint Life Sciences Engineering Healthcare Government Energy, Oil & Gas Finance
  • 5. The Forrester Wave™: E-Signatures, Q2 2013 “The Strongest Digital Signature Solution” CoSign by “ARX has the most advanced digital signature capability in the field… easily integrates with internal security and credential management along with a strong central administration” “Enterprise architects should include e-signatures as part of an overall ECM and BPM strategy… a foundational technology along with records management, eDiscovery, and other content services.” “Dramatic savings, successful implementation, no legal challenges”
  • 6. What is a Digital Signature? Digital signatures replace handwritten signatures for electronic documents. Digital signature is unique to both document & signer Digitally signed documents have legal effect and trust outside of the organization Document Digital Signature Signed Document + Document Hash Signer’s Private Key Signer’s ID + Digital Signatures are NON-FORGEABLE
  • 7. AdminUser Directory Built-in Key- Management; Private-key Ops Built-in Management for Certificates (CA) Graphic- Signature Management User-management Policy (directory) drives signature-privilege management. Signature credentials (keys & certs) maintained in secure appliance.Desktop Apps Web Apps Mobile Apps End- Users CoSign = Turnkey Solution (installs in ~4 hours) Securely Request Signature Services Central Control over Signature Privileges Policy General Deployment Architecture FIPS 140-2 level 3 Secure
  • 8. Features Non-forgeable digital signatures Centralized approach, follows existing user management policies. Secure Enclosure Extensive 3rd party application support Multiple authentication methods Built-in CA User management synchronization Graphical signature (wet-signature) Easy Integration with applications & systems (SAPI: Signature API)
  • 9. Flexibility & Scalability CoSign is scalable from few users to hundreds of thousands by just upgrading the licensing key CoSign is flexible enough to offer easy integration with multiple with business application and workflow processes. CoSign allows high availability configuration - enables an organization to setup several CoSign appliances capable of working in support of each other to provide: Redundancy, Load Balancing, Disaster Recovery, Elimination of long latency
  • 11. CoSign High Level Architecture - BOI Client Computers CoSign Client XML Signing Application CoSign Appliances HA/LB: Optional On premises or Cloud Signature request Authentication XML Hash Signature response Signed hash Signer certificate
  • 12. Questions? Try CoSign for free today Visit www.arx.com to get your free CoSign trial