SlideShare a Scribd company logo
1 of 4
Download to read offline
Entrust IdentityGuard Mobile
Mobile Solutions for Greater Authentication Security                                  Product Benefits
As mobile devices continue to expand in capability and popularity, they present       • Enables strong mobile authentication
                                                                                        with out-of-band transaction
tremendous opportunities for consumers and enterprises alike. This shift to more        confirmation
mobile-centric environments spans consumer-based activities like mobile banking       • Leverages mobile devices to boost
or smartphone transactions, as well as more enterprise-specific tasks such as email     authentication strength without
communication, secure VPN, and physical, logical and mobile access.                     inconvenience
                                                                                      • Provides soft token authentication for
Financial Institutions Fight Fraud                                                      customer or enterprise environments
While there are many safeguards deployed inside financial institutions today,         • Transforms today’s popular smartphones
                                                                                        into mobile credentials
criminals are increasingly turning to highly effective social engineering tactics,
combined with stealthy malware, to illegally obtain consumer identities.              • Includes standards-based (OATH)
                                                                                        authentication and signature
To combat these attacks, Entrust IdentityGuard Mobile provides three tools
                                                                                      • Support for leading mobile platforms
that help organizations stop many types of online and mobile fraud threats.             including Apple iOS, RIM BlackBerry,
                                                                                        Google Android and Microsoft Windows
• Mobile One-Time-Passcode Tokens                                                       Mobile (6.0-6.5)
  Entrust enables organizations to transform smartphones into convenient, secure      • Customizable to include organization-
  one-time-passcode (OTP) tokens, leveraging devices that are widely deployed,          specific branding for increased user
  to provide convenient security for online banking. Organizations can also brand       acceptance
  these soft tokens for better customer or employee recognition. And this is a
  proven method that helps defend against today’s advanced malware, like
  man-in-the-browser attacks.

• Out-of-Band Verification
  Entrust’s mobile application provides out-of-band notification of transaction
  details as part of the authentication process, and enables users to confirm the
  legitimacy of transactions. Entrust IdentityGuard also includes the ability to
  store and refer to transaction history.

• Transparent Strong Authentication
  Entrust's easy-to-use software development kit (SDK) helps organizations embed
  transparent strong authentication right into their own mobile application. This
  provides transparent security for consumers using mobile banking, while enabling
  organizations to enhance security for the online channel.

  And embedding OTP technology in a mobile device is more cost-effective than
  purchasing, issuing and deploying hardware tokens because it leverages devices
  that are already widely deployed — increasing user acceptance.
Mobile Devices Improve Enterprise Security                                 Through the Entrust IdentityGuard platform, organizations
Much like the approach to securing mobile-banking                          may even transform end-user smartphones into true
customers, affordable solutions are available to secure                     mobile credentials. Further convenience is realized for
mobile devices that interact or gain access to corporate                   physical and logical access with the support of the latest
environments. But enterprises face a different set of                       industry standards including near-field communication
challenges with mobile devices co-existing within secure                   (NFC) and Bluetooth.
corporate infrastructures.
                                                                           Stronger Authentication via Mobile Devices
The use of mobile soft tokens — primarily to enable                        Entrust provides mobile security capabilities via distinct
strong authentication to enterprise networks, applications                 solution areas — mobile authentication, transaction
and resources — dramatically improves enterprise security.                 verification, mobile smart credentials, and transparent
Not only are they simple to use and deploy, they increase                  authentication technology with an advanced software
end-user adoption and promote cost-savings by removing                     development kit (SDK).
the need to issue expensive hardware tokens.
                                                                           In addition to enabling strong authentication with a
                                                                           software-based OTP token, Entrust IdentityGuard also
                                                                           strongly authenticates online transactions, taking into
                                                                           consideration the details of that specific transaction.

Entrust IdentityGuard Mobile

                                                      User logs in to the online application. This will often
                        Login
  1                                                   include transparent forms of authentication beyond
                                                      username and password (e.g., device authentication).




                       Transfer                       User decides to undertake a more risky transaction;
  2                    $32,150                        a large money transfer or adding a new bill payee,
                                                      for example.




                                                      The bank displays a Web confirmation screen to
  3                                                   the user and also sends the transaction information
                                                      directly to Entrust IdentityGuard Mobile.

                                                      Entrust IdentityGuard Mobile automatically alerts
                                                      the user that they have a waiting transaction.
                                                      The user compares the details of the transaction and,
                                                      if correct, types the generated confirmation code into
                                                      the Web application to complete the action.

Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
Advantages                                                       Portable
Simple Soft Tokens                                               Use the most popular mobile platforms to boost
Transform smartphones into convenient, secure                    authentication strength by not requiring the user to
one-time-passcode (OTP) tokens. This approach has a high         carry an extra hardware device or have access to a
user-adoption rate and can include organizations-specific        specific computer.
branding for better customer or employee recognition.
                                                                 Flexible
Mobile Smart Credentials                                         Supports the use of both simple time-based OTP as well
Entrust adds smart credential capabilities to mobile devices     as out-of-band transaction signatures. Also supports
for physical and logical access, but also provides smartcard-    multiple identities within the same application, enabling
based security for desktops and laptops without native           organizations to fully leverage the deployed application
smartcard readers.                                               (e.g., a banking ID as well as a corporate remote access ID).

Beat MITB                                                        Broad Platform Support
One of the only mobile authentication solution on                Supports the leading mobile platforms on the
the market today that helps defeat advanced malware,             market today, including Apple iOS, RIM BlackBerry,
including man-in-the-browser attacks. Key to interoperability,   Google Android and Microsoft Windows Mobile (6.0-6.5).
it leverages proven time-based, OATH-compliant OTP
authentication and out-of-band transaction verification          Standards-Compliant
on leading mobile devices.                                       Uses the OATH standard for time-based, one-time-
                                                                 passcode and transaction signature generation.
Easy to Use
Enables out-of-band transaction verification,                    Customizable
OATH-compliant signatures and even a method to                   Includes the ability to add organization-specific branding
immediately report suspicions account behavior.                  to each identity, improving usability and reinforcing brand
The end-user isn't forced to enter any data within the           image.
smartphone application, only a straightforward Web
confirmation code to complete the transaction online.            For Developers
                                                                 Entrust's easy-to-use SDK helps organizations embed
Enterprise Mobility                                              transparent and strong authentication right into their
Entrust provides the only authentication platform that fully     own mobile applications.
enables today’s leading mobile platforms for real-world
business use. Entrust’s mobile capabilities make it easy for
end-users to enroll their mobile devices for device
certificate issuance. And advanced mobile smart
credentials can be used with Bluetooth and NFC
technology for even greater convenience.

Easy Integration
Entrust’s open API architecture allows for tight integration
with today's leading mobile device management (MDM),
identity access management (IAM) and public key
infrastructure (PKI) vendors. This enables Entrust
IdentityGuard to work with new and existing enterprise
implementations, plus adds the ability to integrate in-
house or managed service-based digital certificates.
Entrust & You                                                                                      Company Facts
More than ever, Entrust understands your organization’s                                            Website: www.entrust.com
security pain points. Whether it’s the protection of                                               Employees: 359
information, securing online customers, regulatory                                                 Customers: 5,000
compliance or large-scale government projects, Entrust                                             Offices: 10 globally
provides identity-based security solutions that are not
only proven in real-world environments, but cost-effective                                          Headquarters
in today’s uncertain economic climate.                                                             One Lincoln Centre
                                                                                                   5400 LBJ Freeway, Suite 1340
The smart choice for properly securing digital identities                                          Dallas, Texas 75240 USA
and information, Entrust solutions represent the right
balance between affordability, expertise and service. For                                           Sales
more information on Entrust IdentityGuard Mobile, contact                                          North America: 1-888-690-2424
the Entrust representative in your area at 888-690-2424 or                                         EMEA: +44 (0) 118 953 3000
visit entrust.com/mobile.                                                                          Email: entrust@entrust.com




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations
spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain
points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust
products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product
names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks
or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved.
                                                                                                                                                                                    24003/4-12

More Related Content

What's hot

Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 

What's hot (17)

Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
test
testtest
test
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Currency
CurrencyCurrency
Currency
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 

Viewers also liked

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesEntrust Datacard
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 

Viewers also liked (6)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 

Similar to Entrust IdentityGuard Mobile

Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenskate_holden
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachPortalGuard
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 

Similar to Entrust IdentityGuard Mobile (20)

Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
status
statusstatus
status
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 

Recently uploaded

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

Entrust IdentityGuard Mobile

  • 1. Entrust IdentityGuard Mobile Mobile Solutions for Greater Authentication Security Product Benefits As mobile devices continue to expand in capability and popularity, they present • Enables strong mobile authentication with out-of-band transaction tremendous opportunities for consumers and enterprises alike. This shift to more confirmation mobile-centric environments spans consumer-based activities like mobile banking • Leverages mobile devices to boost or smartphone transactions, as well as more enterprise-specific tasks such as email authentication strength without communication, secure VPN, and physical, logical and mobile access. inconvenience • Provides soft token authentication for Financial Institutions Fight Fraud customer or enterprise environments While there are many safeguards deployed inside financial institutions today, • Transforms today’s popular smartphones into mobile credentials criminals are increasingly turning to highly effective social engineering tactics, combined with stealthy malware, to illegally obtain consumer identities. • Includes standards-based (OATH) authentication and signature To combat these attacks, Entrust IdentityGuard Mobile provides three tools • Support for leading mobile platforms that help organizations stop many types of online and mobile fraud threats. including Apple iOS, RIM BlackBerry, Google Android and Microsoft Windows • Mobile One-Time-Passcode Tokens Mobile (6.0-6.5) Entrust enables organizations to transform smartphones into convenient, secure • Customizable to include organization- one-time-passcode (OTP) tokens, leveraging devices that are widely deployed, specific branding for increased user to provide convenient security for online banking. Organizations can also brand acceptance these soft tokens for better customer or employee recognition. And this is a proven method that helps defend against today’s advanced malware, like man-in-the-browser attacks. • Out-of-Band Verification Entrust’s mobile application provides out-of-band notification of transaction details as part of the authentication process, and enables users to confirm the legitimacy of transactions. Entrust IdentityGuard also includes the ability to store and refer to transaction history. • Transparent Strong Authentication Entrust's easy-to-use software development kit (SDK) helps organizations embed transparent strong authentication right into their own mobile application. This provides transparent security for consumers using mobile banking, while enabling organizations to enhance security for the online channel. And embedding OTP technology in a mobile device is more cost-effective than purchasing, issuing and deploying hardware tokens because it leverages devices that are already widely deployed — increasing user acceptance.
  • 2. Mobile Devices Improve Enterprise Security Through the Entrust IdentityGuard platform, organizations Much like the approach to securing mobile-banking may even transform end-user smartphones into true customers, affordable solutions are available to secure mobile credentials. Further convenience is realized for mobile devices that interact or gain access to corporate physical and logical access with the support of the latest environments. But enterprises face a different set of industry standards including near-field communication challenges with mobile devices co-existing within secure (NFC) and Bluetooth. corporate infrastructures. Stronger Authentication via Mobile Devices The use of mobile soft tokens — primarily to enable Entrust provides mobile security capabilities via distinct strong authentication to enterprise networks, applications solution areas — mobile authentication, transaction and resources — dramatically improves enterprise security. verification, mobile smart credentials, and transparent Not only are they simple to use and deploy, they increase authentication technology with an advanced software end-user adoption and promote cost-savings by removing development kit (SDK). the need to issue expensive hardware tokens. In addition to enabling strong authentication with a software-based OTP token, Entrust IdentityGuard also strongly authenticates online transactions, taking into consideration the details of that specific transaction. Entrust IdentityGuard Mobile User logs in to the online application. This will often Login 1 include transparent forms of authentication beyond username and password (e.g., device authentication). Transfer User decides to undertake a more risky transaction; 2 $32,150 a large money transfer or adding a new bill payee, for example. The bank displays a Web confirmation screen to 3 the user and also sends the transaction information directly to Entrust IdentityGuard Mobile. Entrust IdentityGuard Mobile automatically alerts the user that they have a waiting transaction. The user compares the details of the transaction and, if correct, types the generated confirmation code into the Web application to complete the action. Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
  • 3. Advantages Portable Simple Soft Tokens Use the most popular mobile platforms to boost Transform smartphones into convenient, secure authentication strength by not requiring the user to one-time-passcode (OTP) tokens. This approach has a high carry an extra hardware device or have access to a user-adoption rate and can include organizations-specific specific computer. branding for better customer or employee recognition. Flexible Mobile Smart Credentials Supports the use of both simple time-based OTP as well Entrust adds smart credential capabilities to mobile devices as out-of-band transaction signatures. Also supports for physical and logical access, but also provides smartcard- multiple identities within the same application, enabling based security for desktops and laptops without native organizations to fully leverage the deployed application smartcard readers. (e.g., a banking ID as well as a corporate remote access ID). Beat MITB Broad Platform Support One of the only mobile authentication solution on Supports the leading mobile platforms on the the market today that helps defeat advanced malware, market today, including Apple iOS, RIM BlackBerry, including man-in-the-browser attacks. Key to interoperability, Google Android and Microsoft Windows Mobile (6.0-6.5). it leverages proven time-based, OATH-compliant OTP authentication and out-of-band transaction verification Standards-Compliant on leading mobile devices. Uses the OATH standard for time-based, one-time- passcode and transaction signature generation. Easy to Use Enables out-of-band transaction verification, Customizable OATH-compliant signatures and even a method to Includes the ability to add organization-specific branding immediately report suspicions account behavior. to each identity, improving usability and reinforcing brand The end-user isn't forced to enter any data within the image. smartphone application, only a straightforward Web confirmation code to complete the transaction online. For Developers Entrust's easy-to-use SDK helps organizations embed Enterprise Mobility transparent and strong authentication right into their Entrust provides the only authentication platform that fully own mobile applications. enables today’s leading mobile platforms for real-world business use. Entrust’s mobile capabilities make it easy for end-users to enroll their mobile devices for device certificate issuance. And advanced mobile smart credentials can be used with Bluetooth and NFC technology for even greater convenience. Easy Integration Entrust’s open API architecture allows for tight integration with today's leading mobile device management (MDM), identity access management (IAM) and public key infrastructure (PKI) vendors. This enables Entrust IdentityGuard to work with new and existing enterprise implementations, plus adds the ability to integrate in- house or managed service-based digital certificates.
  • 4. Entrust & You Company Facts More than ever, Entrust understands your organization’s Website: www.entrust.com security pain points. Whether it’s the protection of Employees: 359 information, securing online customers, regulatory Customers: 5,000 compliance or large-scale government projects, Entrust Offices: 10 globally provides identity-based security solutions that are not only proven in real-world environments, but cost-effective Headquarters in today’s uncertain economic climate. One Lincoln Centre 5400 LBJ Freeway, Suite 1340 The smart choice for properly securing digital identities Dallas, Texas 75240 USA and information, Entrust solutions represent the right balance between affordability, expertise and service. For Sales more information on Entrust IdentityGuard Mobile, contact North America: 1-888-690-2424 the Entrust representative in your area at 888-690-2424 or EMEA: +44 (0) 118 953 3000 visit entrust.com/mobile. Email: entrust@entrust.com About Entrust A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved. 24003/4-12