SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Smart Card Forum Prague
Evolution of Authentication market & Beyond
New challenges for enterprises

                                 JĂ©rĂ´me Soufflot
                            EMEA Channel Team
                    Marketing & Bus development
Gemalto: Security To Be Free
More than just a company tag line…it is why we exist




     Communicate                   Shop                      Travel




                                                       In ways that are
                                                          convenient,
                                                        enjoyable and
        Bank                       Work                     secure




                                                                          2
Gemalto’s Secure Personal Devices
…are in the hands of billions of individuals worldwide


     1.5 billion secure devices – Produced and personalized in 2009
     200 million citizens – Received a Gemalto produced e-Passport
     500 million people – Carry a Gemalto produced credit card
     400 mobile operators – Connecting 2 billion subscribers
     30 years experience – designing/producing secure personal devices




                                                                         3
Global Leadership Position


      Top producer of:
              SIM cards and UICC (1)
              Over-The-Air platforms(2)
              Chip payment cards(4)
              Chip-based corporate security solutions(1)
              e-Passports (3)


      Innovation leadership examples
              Ezio optical reader for online banking
              YuuWaa – Combines flash memory with online services


*Source: (1) Frost & Sullivan; (2) Gemalto (3) Keesing Journal of Identity ; (4) The Nilson Report



                                                                                                     4
Entreprises




              5
Since 2007 and Beyond

Even more devices and…
…more ways to run Applications
Security of mobile workforces:
Top Concern for end users and IT Managers

                           Source Cisco -2010
                           extract Cisco Connected World report




                                                                  7
Enterprise & Employee Identity ?
  “An identity is a set of claims one principal makes about another
        principal in the context of an established relationship”



        Username /PW                               Passport




        Smartcards                                  Picture
                                Name
                               Address
                              Telephone
        IP-Address             Mobile
                                                 Biometrics

                                 Fax
                               Building
                               Room #
Security is a Balancing Act




Must balance between

     Strength          and    Usability
                                          10
Why Strong Authentication?
Protecting digital assets is a critical need for every business


   Provides protection from unauthorized access

   Provides audit trail of individual access activity

   Increases security while being easy to use for the employee

   Easy to deploy for the administrator

   Enterprise computing infrastructures — on premise,
   hosted, or in the cloud — demand rigorous attention to
   who, what, where, when, and how a person or an entity
   accesses data. Security solutions must verify and
   provide assurance that those requesting access are
   indeed who and what they say they are.

                               – Sally Hudson IDC 2010

                                                                  11
Risk of Weak Authentication
Would you leave your house without locking the door?


   Unauthorized access

   Data theft of digital assets (Intellectual Property)

   Loss of brand reputation and customer trust

   No audit trail – compliance ramifications

   Data breaches cost U.S. businesses an average of
   $6.75 million per breach

                  - Ponemon Institute, 2009 Study




                                                          12
Online Security concerns reach the public domain
    Increasing number of attacks and breaches
      Wikileaks – Thousands of secure documents obtained
       and released due to unencrypted data transmission.
      Epsilon– Millions of email records were recently
       compromised when a hacked was able to gain
       unauthorized access to outsourced email marketer
       Episilon’s data store.
      RSA – Security vendor RSA was victim of an advanced
       persistent threat which resulted in compromising their
       most valuable intellectual property.
      Sony Playstation Network –Fraudsters have obtained
       data on around 70 million online video gamers. Details
       including their names, addresses, dates of birth,
       passwords, security questions and credit card details.

     Web giants proposing now Strong Authentication options to
     their users



                                                                 13
Choose Authentication Appropriate
Security level

                          •Mix authentication
              Biometry    method on the same
                                device

                           •Select appropriate
     Cost



                         Security level justified
               PKI       for specific enterprise
                                use case

                         •Complete IT security
                          already deployed by
               OTP       credentials protection




                                                    14
Protiva SA Server
The Heart of Protiva Strong Authentication
    Validation server supporting OTP authentication
    ď‚· Standards based technology
        ď‚· Tokens - OATH event based or time based
         Mobile App – Time based with time stamping


    Web based administrator interface for user management

    User self-care portal for registration and password back-up

    Easily integrates with existing infrastructure
    ď‚· Established integrations with leading infrastructure technology
         Databases – MySQL, MS SQL, Oracle, IBM DB2, etc.
         User Data Repository – Microsoft AD, Novel eDirectory, Sun One, Open LDAP, etc.
         Authentication Service – HTTP/HTTPS, SOAP, SAML 2.0, XML, RADIUS, Microsoft
                                      IAS/NPS, etc.




                5/2/2011                                                                    16
First level Gemalto answer
Protiva Mobile OTP

   2-factor authentication (OTP)
   Application installed on the mobile
   phone which allow users to
   securely generate a One-Time
   Password (OTP) using their mobile
   phone as a token.
   Out-of-band time based OTP
   Combination of security and      User ID:    MyID

   convenience of one time          Password:   ********
   password generated on a
                                    OTP:        189763
   mobile device
   Integrated in Protiva
   SA Server for convenient
   central administration

                                                           17
Why Protiva Mobile OTP?

   Increasing part of Mobile usage (Smartphone..) in
   Enterprise context
   The true advantages of mobility with the appropriate
   security level
   Easy user adoption:
    ď‚· Simple to use for enrolment and OTP generation
    ď‚· No additional hardware to carry
   Easy to deploy and manage by administrator
   SA Server support large types of devices which allow
   adapted security solution
   Optimizing TCO of security




                                                          18
Gemalto SA Server Devices
                          OTP                                      Sec
       OTP                                    OTP      PKI        Flash




                           SA Mobile-OTP
        SA SMS-OTP                            Smart Guardian

                                                                                   OTP    OTP on display
                                                           OTP         OTP   PKI
 OTP
                                SA Server
                                                                                   OTP    OTP connected


                                                                                   PKI
                                                                                          PKI support


                                                                                          Physical access

 SA Easy OTP V3                                              SA .Net Dual          Sec    Secure storage
                                                                                   Flas
                                                                                    h

        OTP      PKI                        OTP      OTP         PKI
                          OTP      PKI




                                                  .Net Card with
              .Net Card                            OTP reader
                                 .Net Key

                                                                                                  19
Mobility & Cloud will accelerate market change


    More Smartphones + Notebook than Desktop PCs




    Q1/10:             54Mu      48Mu             32Mu
    (IDC, Strategic Analytics)




    With the same connectivity demand, whatever the
    device
    ď‚· I want to access my social network on my mobile
     I want to read my company’s encrypted emails while traveling
    ď‚· I want to pay my parking with my handset

                                                                     20
Market Drivers for SAAS security




   Increase in Enterprise adoption of Hybrid model
   Proliferation of SaaS and Federated SSO
   Quick time to market/deployment
   Differentiator for businesses
   Helpdesk cost of supporting passwords
   Regulatory Compliance
    ď‚·   FFIEC, PCI-DSS, European Data Protection Directive, HIPAA/HITECH, SOX

                                                                                21
First level of Service in the Cloud
  Ex : Device Administration Services (SAS)

ď‚Ş Issuance and Administration of Gemalto .NET based devices

ď‚Ş End User Gemalto .NET devices management
      Change PIN
      Remote PIN Unblock
      View device info (diagnose)
      View Certificate on device
      Delete Certificates, load P12 file                   Small      Midmarket
      Modify PIN Policy (DAS 2.0)                         Business
                                                           <25 PCs     25-500 PCs
ď‚Ş Administrator .NET devices management                    1-49        50-1,000
    Remote PIN Unblock                                    employees   employees
    Reset Gemalto .NET devices
    Activation and personalization of End User devices:
          – End-user Administration Key diversification
          – Default PIN Value
          – Number of PIN attempts
                                                                                   22
Protiva - A Flexible Authentication Solution
Easily Implement Strong Authentication
    Protiva Strong Authentication Service
    ď‚· A Hosted OTP solution



    Hosted Strong Authentication Service Provides:
    ď‚·   Complete On Boarding and Device Fulfillment
    ď‚·   Flexible billing solutions
    ď‚·   Web based portal for device management
    ď‚·   Option for complete management of authentication
        servers (No CAPEX)


    On Premise Authentication Option
    ď‚·   Complete fulfillment for token provisioning
    ď‚·   Protiva SA Server on premise for authentication
        (managed by company IT)
    ď‚·   Web based portal for user maintenance



                  5/2/2011                                 23
Hosted Strong Authentication Service
                                      Corporate Network                              Protiva Strong
                                                                                 Authentication Service
                                       Corporate Data Resources/
                                             Applications



                                                                        LDAPS
                                    Identity Store                                      Device Database
                                      (LDAP/AD)

                                                           Gemalto
                                                            Agent       HTTPS
                                        RADIUS                          Tunnel           Authentication
                                                                                        Attempt Validated
                       VPN or
                   Secure Gateway
                                              RADIUS Server




                                                                                    Protiva
                                                     Complete OTP Fulfillment
                                                                                    Service Features
                                                      (Mobile App or Token)         • Complete Authentication
    User OTP
  Authentication                                                                      Management
     Request
                                                                                    • Easy On Boarding
                                                                                    • OTP Credential
                                                                                      Fulfillment
                                                                                    • Easy Billing/Licensing
                                                                                    • Custom Webstore
     Remote or Local User




                         5/2/2011                                                                               24
User On Boarding
Easy, Fast, Simple
    For Existing Users
    ď‚· SA Server automatically pulls LDAP information
      from directory store

    For New Users
    ď‚· Web based management portal
        ď‚· Administrators can quickly and easily add new users


    User Self Care
    ď‚· For token ordering
        ď‚· Webstore option for user self registration and token ordering

    ď‚· For mobile app OTP
        ď‚· Hosted Application Gateway
             – Directs to appropriate mobile app store based on phone type.




                5/2/2011                                                      25
User On Boarding
Custom Webstore – User Direct Token Ordering



                                    Gemalto Webstore
                                    Features:

                                    • Customized web
                                      interface

                                    • Direct user billing

                                    • User self-registration

                                    • Automates OTP
                                      device fulfillment




            5/2/2011                                           26
Strong authentication Service - Fulfillment
End User Initiated Fulfilment




 Fulfillment Process


            Order                           Receive               Use
           Two Factor Auth                  2FA credential or     User can start using
           (2FA) credential or              token is shipped or   strong 2FA to
           token ordered by                 made available to     protect access to
           end user                         end user              cloud resources




                     5/2/2011Jan 27, 2010                                                27
Benefits of Hosted Authentication
                                                  Cloud Service               Online
         SMB                Fortune 500
                                                    Providers                 Gaming

  • Secure data           • Meet regulatory      • Secure                • Secure access
    resources without       requirements for       authentication as a     ensures only
    additional CAPEX        data protection        differentiator from     authorized users
                                                   other cloud service     transact within the
  • Full authentication   • Reduce the cost of     providers               game
    management              password
    without additional      management and       • Little to no          • Little to no
    IT resources            help desk calls        authentication cost     authentication cost
                                                   through direct user     through direct user
                                                   billing                 billing




       A Complete Authentication solution
         •    On Boarding, Fulfillment, Authentication Server Maintenance and Billing
       Easy to integrate – Easy to manage
       Flexible Licensing Models
       No additional CAPEX


                                                                                                 28
Welcome in Gemalto Partner Network

  Gemalto has solid long-term relationships with its partners by
  focusing on customers and skills
  we offer solutions that are fully interoperable and configurable
  to meet the requirements of our customers.
  Gemalto partners are the leaders in their respective categories:
  software, communications, security products, identity
  management systems, data centers, logistics, …




                                                                     29
Thank You


email : jerome.soufflot@gemalto.com

Weitere ähnliche Inhalte

Was ist angesagt?

Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Tyfone Next Gen Mobile Financial Services
Tyfone   Next Gen Mobile Financial ServicesTyfone   Next Gen Mobile Financial Services
Tyfone Next Gen Mobile Financial ServicesCarol Grunberg
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_minMatthew Shin
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...SafeNet
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hatgopikurup
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Ericsson Labs
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzenThomas Dehler
 

Was ist angesagt? (19)

Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Tyfone Next Gen Mobile Financial Services
Tyfone   Next Gen Mobile Financial ServicesTyfone   Next Gen Mobile Financial Services
Tyfone Next Gen Mobile Financial Services
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hat
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 

Ă„hnlich wie SmartCard Forum 2011 - Evolution of authentication market

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecurityAndreas Leicher
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for MobileCA API Management
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012K-Team Consulting Srl
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overviewPrivateWave Italia SpA
 

Ă„hnlich wie SmartCard Forum 2011 - Evolution of authentication market (20)

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 

Mehr von OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­OKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securityOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?OKsystem
 

Mehr von OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - KomerÄŤnĂ­ prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­
Smart Cards & Devices Forum 2013 - ZabezpeÄŤenĂ­ mobilnĂ­ch bankovnictvĂ­
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?
UmĂ­te efektivnÄ› spravovat poĹľadavky (nejen) na IT sluĹľby?
 

KĂĽrzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

KĂĽrzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

SmartCard Forum 2011 - Evolution of authentication market

  • 1. Smart Card Forum Prague Evolution of Authentication market & Beyond New challenges for enterprises JĂ©rĂ´me Soufflot EMEA Channel Team Marketing & Bus development
  • 2. Gemalto: Security To Be Free More than just a company tag line…it is why we exist Communicate Shop Travel In ways that are convenient, enjoyable and Bank Work secure 2
  • 3. Gemalto’s Secure Personal Devices …are in the hands of billions of individuals worldwide 1.5 billion secure devices – Produced and personalized in 2009 200 million citizens – Received a Gemalto produced e-Passport 500 million people – Carry a Gemalto produced credit card 400 mobile operators – Connecting 2 billion subscribers 30 years experience – designing/producing secure personal devices 3
  • 4. Global Leadership Position Top producer of: SIM cards and UICC (1) Over-The-Air platforms(2) Chip payment cards(4) Chip-based corporate security solutions(1) e-Passports (3) Innovation leadership examples Ezio optical reader for online banking YuuWaa – Combines flash memory with online services *Source: (1) Frost & Sullivan; (2) Gemalto (3) Keesing Journal of Identity ; (4) The Nilson Report 4
  • 6. Since 2007 and Beyond Even more devices and… …more ways to run Applications
  • 7. Security of mobile workforces: Top Concern for end users and IT Managers Source Cisco -2010 extract Cisco Connected World report 7
  • 8. Enterprise & Employee Identity ? “An identity is a set of claims one principal makes about another principal in the context of an established relationship” Username /PW Passport Smartcards Picture Name Address Telephone IP-Address Mobile Biometrics Fax Building Room #
  • 9. Security is a Balancing Act Must balance between Strength and Usability 10
  • 10. Why Strong Authentication? Protecting digital assets is a critical need for every business Provides protection from unauthorized access Provides audit trail of individual access activity Increases security while being easy to use for the employee Easy to deploy for the administrator Enterprise computing infrastructures — on premise, hosted, or in the cloud — demand rigorous attention to who, what, where, when, and how a person or an entity accesses data. Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. – Sally Hudson IDC 2010 11
  • 11. Risk of Weak Authentication Would you leave your house without locking the door? Unauthorized access Data theft of digital assets (Intellectual Property) Loss of brand reputation and customer trust No audit trail – compliance ramifications Data breaches cost U.S. businesses an average of $6.75 million per breach - Ponemon Institute, 2009 Study 12
  • 12. Online Security concerns reach the public domain Increasing number of attacks and breaches ď‚· Wikileaks – Thousands of secure documents obtained and released due to unencrypted data transmission. ď‚· Epsilon– Millions of email records were recently compromised when a hacked was able to gain unauthorized access to outsourced email marketer Episilon’s data store. ď‚· RSA – Security vendor RSA was victim of an advanced persistent threat which resulted in compromising their most valuable intellectual property. ď‚· Sony Playstation Network –Fraudsters have obtained data on around 70 million online video gamers. Details including their names, addresses, dates of birth, passwords, security questions and credit card details. Web giants proposing now Strong Authentication options to their users 13
  • 13. Choose Authentication Appropriate Security level •Mix authentication Biometry method on the same device •Select appropriate Cost Security level justified PKI for specific enterprise use case •Complete IT security already deployed by OTP credentials protection 14
  • 14. Protiva SA Server The Heart of Protiva Strong Authentication Validation server supporting OTP authentication ď‚· Standards based technology ď‚· Tokens - OATH event based or time based ď‚· Mobile App – Time based with time stamping Web based administrator interface for user management User self-care portal for registration and password back-up Easily integrates with existing infrastructure ď‚· Established integrations with leading infrastructure technology ď‚· Databases – MySQL, MS SQL, Oracle, IBM DB2, etc. ď‚· User Data Repository – Microsoft AD, Novel eDirectory, Sun One, Open LDAP, etc. ď‚· Authentication Service – HTTP/HTTPS, SOAP, SAML 2.0, XML, RADIUS, Microsoft IAS/NPS, etc. 5/2/2011 16
  • 15. First level Gemalto answer Protiva Mobile OTP 2-factor authentication (OTP) Application installed on the mobile phone which allow users to securely generate a One-Time Password (OTP) using their mobile phone as a token. Out-of-band time based OTP Combination of security and User ID: MyID convenience of one time Password: ******** password generated on a OTP: 189763 mobile device Integrated in Protiva SA Server for convenient central administration 17
  • 16. Why Protiva Mobile OTP? Increasing part of Mobile usage (Smartphone..) in Enterprise context The true advantages of mobility with the appropriate security level Easy user adoption: ď‚· Simple to use for enrolment and OTP generation ď‚· No additional hardware to carry Easy to deploy and manage by administrator SA Server support large types of devices which allow adapted security solution Optimizing TCO of security 18
  • 17. Gemalto SA Server Devices OTP Sec OTP OTP PKI Flash SA Mobile-OTP SA SMS-OTP Smart Guardian OTP OTP on display OTP OTP PKI OTP SA Server OTP OTP connected PKI PKI support Physical access SA Easy OTP V3 SA .Net Dual Sec Secure storage Flas h OTP PKI OTP OTP PKI OTP PKI .Net Card with .Net Card OTP reader .Net Key 19
  • 18. Mobility & Cloud will accelerate market change More Smartphones + Notebook than Desktop PCs Q1/10: 54Mu 48Mu 32Mu (IDC, Strategic Analytics) With the same connectivity demand, whatever the device ď‚· I want to access my social network on my mobile ď‚· I want to read my company’s encrypted emails while traveling ď‚· I want to pay my parking with my handset 20
  • 19. Market Drivers for SAAS security Increase in Enterprise adoption of Hybrid model Proliferation of SaaS and Federated SSO Quick time to market/deployment Differentiator for businesses Helpdesk cost of supporting passwords Regulatory Compliance ď‚· FFIEC, PCI-DSS, European Data Protection Directive, HIPAA/HITECH, SOX 21
  • 20. First level of Service in the Cloud Ex : Device Administration Services (SAS) ď‚Ş Issuance and Administration of Gemalto .NET based devices ď‚Ş End User Gemalto .NET devices management  Change PIN  Remote PIN Unblock  View device info (diagnose)  View Certificate on device  Delete Certificates, load P12 file Small Midmarket  Modify PIN Policy (DAS 2.0) Business <25 PCs 25-500 PCs ď‚Ş Administrator .NET devices management 1-49 50-1,000  Remote PIN Unblock employees employees  Reset Gemalto .NET devices  Activation and personalization of End User devices: – End-user Administration Key diversification – Default PIN Value – Number of PIN attempts 22
  • 21. Protiva - A Flexible Authentication Solution Easily Implement Strong Authentication Protiva Strong Authentication Service ď‚· A Hosted OTP solution Hosted Strong Authentication Service Provides: ď‚· Complete On Boarding and Device Fulfillment ď‚· Flexible billing solutions ď‚· Web based portal for device management ď‚· Option for complete management of authentication servers (No CAPEX) On Premise Authentication Option ď‚· Complete fulfillment for token provisioning ď‚· Protiva SA Server on premise for authentication (managed by company IT) ď‚· Web based portal for user maintenance 5/2/2011 23
  • 22. Hosted Strong Authentication Service Corporate Network Protiva Strong Authentication Service Corporate Data Resources/ Applications LDAPS Identity Store Device Database (LDAP/AD) Gemalto Agent HTTPS RADIUS Tunnel Authentication Attempt Validated VPN or Secure Gateway RADIUS Server Protiva Complete OTP Fulfillment Service Features (Mobile App or Token) • Complete Authentication User OTP Authentication Management Request • Easy On Boarding • OTP Credential Fulfillment • Easy Billing/Licensing • Custom Webstore Remote or Local User 5/2/2011 24
  • 23. User On Boarding Easy, Fast, Simple For Existing Users ď‚· SA Server automatically pulls LDAP information from directory store For New Users ď‚· Web based management portal ď‚· Administrators can quickly and easily add new users User Self Care ď‚· For token ordering ď‚· Webstore option for user self registration and token ordering ď‚· For mobile app OTP ď‚· Hosted Application Gateway – Directs to appropriate mobile app store based on phone type. 5/2/2011 25
  • 24. User On Boarding Custom Webstore – User Direct Token Ordering Gemalto Webstore Features: • Customized web interface • Direct user billing • User self-registration • Automates OTP device fulfillment 5/2/2011 26
  • 25. Strong authentication Service - Fulfillment End User Initiated Fulfilment Fulfillment Process Order Receive Use Two Factor Auth 2FA credential or User can start using (2FA) credential or token is shipped or strong 2FA to token ordered by made available to protect access to end user end user cloud resources 5/2/2011Jan 27, 2010 27
  • 26. Benefits of Hosted Authentication Cloud Service Online SMB Fortune 500 Providers Gaming • Secure data • Meet regulatory • Secure • Secure access resources without requirements for authentication as a ensures only additional CAPEX data protection differentiator from authorized users other cloud service transact within the • Full authentication • Reduce the cost of providers game management password without additional management and • Little to no • Little to no IT resources help desk calls authentication cost authentication cost through direct user through direct user billing billing A Complete Authentication solution • On Boarding, Fulfillment, Authentication Server Maintenance and Billing Easy to integrate – Easy to manage Flexible Licensing Models No additional CAPEX 28
  • 27. Welcome in Gemalto Partner Network Gemalto has solid long-term relationships with its partners by focusing on customers and skills we offer solutions that are fully interoperable and configurable to meet the requirements of our customers. Gemalto partners are the leaders in their respective categories: software, communications, security products, identity management systems, data centers, logistics, … 29
  • 28. Thank You email : jerome.soufflot@gemalto.com