SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
Moving your customer authentication
to the next level with SxS.
Robert Mihaljek
Sales Manager, International Markets
robert.mihaljek@asseco-see.hr
asseco.com/see
3
Robert Mihaljek
4
Agenda
Staying secure in the era of impatient customers
On the “scale” from SMS to behavior authentication – which is the best for my organization?
Cut the cost and improve the user experience? Is this even possible?
How to build the optimal authentication ecosystem with minimum effort for the organization/best
practices?
Strong authentication for remote work
5
7
References on 4 continents (Europe, Africa, USA, Asia) with more than 140 customers
Securing 5MM+ users on Banking Digital channels
Top player for banking in Europe, one of leading Banking Security and Compliance vendors
Succesful rollout of full scope PSD2 solutions, with focus on Strong Customer Authentication
Focus on digital banking channels (eBanking, mBanking, eCommerce…)
20+ years of experience
Staying secure in the era
of impatient customers.
8
On the “scale” from SMS to behavior
authentication –
which is the best for my
organization?
10
11
SMS
NIST recommended to replace
SMS as an authenticator in
2016
Ways of bypassing SMS 2FA:
interception at Mobile
Operator, social engineering,
man-in-the-middle
Each SMS has a cost
Easy to use
Everyone knows what SMS
is and is familiar with it
12
HW tokens
Very useful substitution if end
user does not have a mobile
application or smartphone
With QR code hw tokens, UX is
highly improved
Does not require Internet
connection
End user needs to have
the physical device
User experience is not
that fluid
Must log in with PIN
13
PUSH notifications
No additional cost when
compared to SMS OTP
Push notifications save a user
13 minutes annually over SMS
OTP (Source: Cisco)
Device with application is
needed
Trade wars can complicate
things: Google Services no longer
supports Huawei devices
14
Behavioral analysis
Frictionless end user experience
Silent identity verification
No need for PIN & password
Latest technology which
prevents most advanced attack
methods
Some end users do not want
to be "watched"
Device with application is
needed
How to cut the cost and
improve user experience?
Is it even possible?
15
16
You have to start with customer experience and work back toward the technology—not the other way around.
- STEVE JOBS
18
Paying bills and performin
transactions in banks
HW token Performing transactions
via internet & mobile
Multi-factor
authentication and
fraud management
Sign transaction
with a single click
BANK
INTERNET
BANKING
COMPLICATED
FORMS
mTOKEN &
mBANKING
BIOMETRY
ONE CLICK
How to build the optimal
authentication ecosystem
with minimum effort for the
organization?
19
21
ECOSYSTEM - THE POWER OF DIGITALIZATION
AUTHENTICATION
SERVER SIDE
MOBILE TOKEN
AI POWERED
SECURITY MODULE
IDENTITY AND
ACCESS
MANAGEMENT
Reduce end-user
time spent in your
branch
Enable end-users
easy transactions
with great
customer
EXPERIENCE
Develop the whole
end-to-end
authenticaton
experince
completely
frictionless
Manage your
applications, user
roles and their
access in less time
1 2 43
Ensure highest
security for
proving user
identity
22
Challenges!
Security in
business and
retail
applications
Authentication
methods that
depend on only
one factor are
very easy to
compromise
Less
layers/factors in
place will cause
the risk of an
intruder gaining
access to critical
systems and
data
Having a weak
authentication
solution relying
solely on static
passwords
leaves the
system
completely
vulnerable to
attacks
Bad user
experience and
outdated
processes for
login and
transaction
verification
PSD2 regulation
driving strong
customer
authentication
(SCA)
23
What will you gain?
On top of
regulation
(local, PSD2)
User experience
improved by
frictionless
methods
High level of
security enabled
by proven
security
mechanism
Easy integration
with any system
or application
Local presence
on the field
enabling
specialized
educations and
trainings
Cost reduction
We offer new features that:
24
Make client’s
business to be more
attractive to the
end-users
Offer the end-users
frictionless user
experience
Reduce time spent
on long processes
and services
How does it work?
25
26
Challenge: How to identify and authenticate bank’s clients to ensure
a user-friendly but highly secure access to banking services?
AssecoAuthenticationSolution
multi-factor authtenticaton solution
wide range of strong authentication methods
high security - hardware or software tokens
https://sxs.asseco.com/
27
Functionalities
ADMINISTRATION
• User management
• Device management
• Authentication properties
configuration
• Administrator management
REPORTING
• Token data
• User data
• Audit log
• Admin user data
AUTHENTICATION
• Multi-factor authentication
• Sign What You See
• Biometrics
• QR code authentication
• Push authentication
SXS SUPPORTS A WIDE RANGE OF AUTHENTICATION METHODS AND
ADMINISTRATION FUNCTIONS
28
Functionalities
SELF-ADMINISTRATION
• Change PIN
• Enrollement
• Migration
• Token reset
• Token management
ADDITIONAL
• Offline and online mode of
work
• Multiple devices per user
• User unlocks his mobile token
with PIN (which is not stored
on the device)
AUTHENTICATION METHODS
• OTP, transaction signing,
challange/response
• Biometrics
• QR code authentication
• Push authentication (HMS also)
• PIN hint
BUILDING „ON-THE-GO” MOBILE USER IDENTITY WITH SECURITY BASED TECHNOLOGY
29
MOBILE TOKEN REDESIGN
30
IDENTITY AND ACCESS MANAGEMENT
IDENTITY ACCESS
Identity lifecycle
Roles and groupes
Process and structure
Authentication – who can
access
Authorization – is
respective user authorized
to have access
31
Benefits
Save time and money
Improve IT efficiency -> single
place to administer user identity
and access rights
Reduce time to deliver of
applications and services -> no
need to reimplement
authentication mechanisms
across applications and services
Enhance security
Single point of authentication
Control person access to
multiple applications at one
place
Universal monitoring
and auditing
Authentication monitoring and
auditing in one system
Enable user behavior analysis
and better fraud detection
Higher user satisfaction
Reducing complexity for end-
users, application owners and IT
Admins
Single sign on (SSO) - access all
of the applications and services
that person needs by signing in
only once using single user
account
HOW WILL AUTHENTICATION LOOK LIKE
The user no longer has to memorize
passwords, enter pins, or rewrite
codes, his behavior is sufficient to
prove his identity.
Additionaly, based on the user
identity risk, user will be ask for
additional authentication.
Demo
33
Demo
34
35
Experience
36
Case study – Group Authentication and Mobile banking
solution – UniCredit CEE
• Project based in Vienna, started 2010.
• Private multitenant cloud deployment
• 9 countries, consistent UX and branding
• Taking care of all authentication needs, compliant
to PSD2 and local regulations
• Agile development team embedded with Bank
• Lower Group TCO for Authentication
• Innovative functionalities and technology
available to all subsidiaries
Case study – Group Authentication and Mobile banking
solution – Intesa Sanpaolo – Project Digical
• Project based in Milano, started 2016.
• Private multitenant cloud deployment
• 5 countries, consistent UX and branding, others
planned
• Agile development team embedded with Bank
• Lower Group TCO for Authentication
• Supporting different HW token devices in
subsidiaries
39
• Smooth PSD2 transition!
Erste Apps running with our SDK
Strong authentication for
remote work.
40
41
Why is authentication needed for remote work?
99.9%
Of attacks can be
blocked with multi-
factor authentication.
Source: Microsoft
Most data breaches
involve weak, default,
or stolen passwords.
Source: Verizon, Telesign, Igloo
81% of breaches are caused by
credential teft
73% of passwords are
duplicates
50% of employees use apps that
aren’t approved by enterprise
42
Why is authentication needed for remote work?
43
Existing clients
• New, internal use
cases initiated
• 10% of existing
clients asked for a
remote work
authentication
solution in last 6
months
New clients
• 50% of all
authentication
inquiries asking
for remote work
solution from the
start
• Smaller players
now need secure
solutions for
remote work also
Partners
• „Adapt or die”
surrounding
• Offering new
business models
as a solution
End users
• Looking for more
security in remote
work mode
• Striving to easy
access and
seamless UI
Market trends from Asseco point of view
44
All in one solution
•Same solution for
clients and
employees
•Applicable to
corporations as well
as to SMEs
•Optional features
for specific
requirements
Variety of
authentication
methods
•From SMS to
behavior biometrics
•No vendor lock-in
•Regulation
compliant and
market proven
Adjustable products
•SDK or full
application for
mToken
•Customizable
application
•Modular solution
architecture
Adjustable business
models
•Perpetual or
subscription
•Monthly or yearly
subscription
•Subscription based
on active users- pay
as you grow
How Asseco can improve security for remote work?
Key takeaways?
45
46
Your organization:
Staying secure in the era of impatient customers – you can do it!
Beheviour authentication with less friction will improve your business
Cut the cost and improve the user experience? It does not have to be a trade off
Optimizing authentication on all your channels can be done with singe UX
Remote work in (post) COVID19 era: you can make it secure
Let’s continue talking.
47
asseco.com Robert Mihaljek
Sales Manager, International Markets
robert.mihaljek@asseco-see.hr
asseco.com/see
48
Legal disclaimer
The content presented in this presentation is subject to copyright protection and has the ownership title. Texts,
graphics, photographs, sound, animations and videos as well as their distribution in the presentation are protected
under the Copyright and related rights Law. Unauthorized use of any material contained in the presentation herein
may constitute an infringement of copyright, trademark or other laws. The materials in this presentation may not be
modified, copied, publicly presented, executed, distributed or used for any other public or commercial purposes,
unless the Board of Asseco Poland S.A. gives consent in writing. Copying for any purpose, including commercial use,
distribution, modification or acquisition of the contents of this presentation by third parties is prohibited. Moreover,
this presentation may contain reference to third-party offers and services. Terms of use for such offers and services
are defined by these entities.
Asseco Poland S.A. assumes no responsibility for the conditions, contents and effects of the use of offers and
services of these entities. The data and information contained in this presentation are for information purposes only.
Presentation was prepared with the use of Inscale company products.
The name and logo of Asseco Poland S.A. are registered trademarks. Use of these marks requires prior express
agreement of Asseco Poland S.A.
2016 © Asseco Poland S.A.

Weitere ähnliche Inhalte

Was ist angesagt?

The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
Viper Web Solutions
 
PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIs
Jason Bloomberg
 

Was ist angesagt? (20)

The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
 
[Workshop] Business Benefits and Digital Transformation through Open Banking
[Workshop] Business Benefits and Digital Transformation through Open Banking[Workshop] Business Benefits and Digital Transformation through Open Banking
[Workshop] Business Benefits and Digital Transformation through Open Banking
 
Mobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challengesMobile - the next wave of opportunities and challenges
Mobile - the next wave of opportunities and challenges
 
Backbase webinar feat. Jim Marous: State of the Digital Customer Journey
Backbase webinar feat. Jim Marous: State of the Digital Customer Journey Backbase webinar feat. Jim Marous: State of the Digital Customer Journey
Backbase webinar feat. Jim Marous: State of the Digital Customer Journey
 
Digital Bank: What and How
Digital Bank: What and HowDigital Bank: What and How
Digital Bank: What and How
 
PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIs
 
[WSO2 Integration Summit Brazil 2019] Open Banking
[WSO2 Integration Summit Brazil 2019] Open Banking[WSO2 Integration Summit Brazil 2019] Open Banking
[WSO2 Integration Summit Brazil 2019] Open Banking
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Case Study: Wilo bank
Case Study: Wilo bankCase Study: Wilo bank
Case Study: Wilo bank
 
UPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUPK - Universal Pass Key General Overview
UPK - Universal Pass Key General Overview
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
The Power of Picture for Customer Acquisition
The Power of Picture for Customer AcquisitionThe Power of Picture for Customer Acquisition
The Power of Picture for Customer Acquisition
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
Seamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYCSeamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYC
 
Case Study: Falabella
Case Study: FalabellaCase Study: Falabella
Case Study: Falabella
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!
 
PSD2 & Open Banking
PSD2 & Open BankingPSD2 & Open Banking
PSD2 & Open Banking
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 

Ähnlich wie Move your customer authentication to the next level!

Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Alireza Ghahrood
 
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
Tim Jefferson
 

Ähnlich wie Move your customer authentication to the next level! (20)

Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
CUSTOMERNEXT
CUSTOMERNEXTCUSTOMERNEXT
CUSTOMERNEXT
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
Revolutionize Banking Software Development In The Financial Market
Revolutionize Banking Software Development In The Financial MarketRevolutionize Banking Software Development In The Financial Market
Revolutionize Banking Software Development In The Financial Market
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Startup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsStartup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo Platforms
 
Loqr
LoqrLoqr
Loqr
 
Keyless Technologies - NOAH19 London
Keyless Technologies - NOAH19 LondonKeyless Technologies - NOAH19 London
Keyless Technologies - NOAH19 London
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Identikey
IdentikeyIdentikey
Identikey
 
Muxi Institutional Presentation
Muxi Institutional PresentationMuxi Institutional Presentation
Muxi Institutional Presentation
 
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
The Human Chain and Digital Services Toolkit Introduction V3.23 27_04_2016
 

Kürzlich hochgeladen

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 

Kürzlich hochgeladen (20)

WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 

Move your customer authentication to the next level!

  • 1.
  • 2. Moving your customer authentication to the next level with SxS. Robert Mihaljek Sales Manager, International Markets robert.mihaljek@asseco-see.hr asseco.com/see
  • 4. 4 Agenda Staying secure in the era of impatient customers On the “scale” from SMS to behavior authentication – which is the best for my organization? Cut the cost and improve the user experience? Is this even possible? How to build the optimal authentication ecosystem with minimum effort for the organization/best practices? Strong authentication for remote work
  • 5. 5
  • 6.
  • 7. 7 References on 4 continents (Europe, Africa, USA, Asia) with more than 140 customers Securing 5MM+ users on Banking Digital channels Top player for banking in Europe, one of leading Banking Security and Compliance vendors Succesful rollout of full scope PSD2 solutions, with focus on Strong Customer Authentication Focus on digital banking channels (eBanking, mBanking, eCommerce…) 20+ years of experience
  • 8. Staying secure in the era of impatient customers. 8
  • 9.
  • 10. On the “scale” from SMS to behavior authentication – which is the best for my organization? 10
  • 11. 11 SMS NIST recommended to replace SMS as an authenticator in 2016 Ways of bypassing SMS 2FA: interception at Mobile Operator, social engineering, man-in-the-middle Each SMS has a cost Easy to use Everyone knows what SMS is and is familiar with it
  • 12. 12 HW tokens Very useful substitution if end user does not have a mobile application or smartphone With QR code hw tokens, UX is highly improved Does not require Internet connection End user needs to have the physical device User experience is not that fluid Must log in with PIN
  • 13. 13 PUSH notifications No additional cost when compared to SMS OTP Push notifications save a user 13 minutes annually over SMS OTP (Source: Cisco) Device with application is needed Trade wars can complicate things: Google Services no longer supports Huawei devices
  • 14. 14 Behavioral analysis Frictionless end user experience Silent identity verification No need for PIN & password Latest technology which prevents most advanced attack methods Some end users do not want to be "watched" Device with application is needed
  • 15. How to cut the cost and improve user experience? Is it even possible? 15
  • 16. 16 You have to start with customer experience and work back toward the technology—not the other way around. - STEVE JOBS
  • 17.
  • 18. 18 Paying bills and performin transactions in banks HW token Performing transactions via internet & mobile Multi-factor authentication and fraud management Sign transaction with a single click BANK INTERNET BANKING COMPLICATED FORMS mTOKEN & mBANKING BIOMETRY ONE CLICK
  • 19. How to build the optimal authentication ecosystem with minimum effort for the organization? 19
  • 20.
  • 21. 21 ECOSYSTEM - THE POWER OF DIGITALIZATION AUTHENTICATION SERVER SIDE MOBILE TOKEN AI POWERED SECURITY MODULE IDENTITY AND ACCESS MANAGEMENT Reduce end-user time spent in your branch Enable end-users easy transactions with great customer EXPERIENCE Develop the whole end-to-end authenticaton experince completely frictionless Manage your applications, user roles and their access in less time 1 2 43 Ensure highest security for proving user identity
  • 22. 22 Challenges! Security in business and retail applications Authentication methods that depend on only one factor are very easy to compromise Less layers/factors in place will cause the risk of an intruder gaining access to critical systems and data Having a weak authentication solution relying solely on static passwords leaves the system completely vulnerable to attacks Bad user experience and outdated processes for login and transaction verification PSD2 regulation driving strong customer authentication (SCA)
  • 23. 23 What will you gain? On top of regulation (local, PSD2) User experience improved by frictionless methods High level of security enabled by proven security mechanism Easy integration with any system or application Local presence on the field enabling specialized educations and trainings Cost reduction
  • 24. We offer new features that: 24 Make client’s business to be more attractive to the end-users Offer the end-users frictionless user experience Reduce time spent on long processes and services
  • 25. How does it work? 25
  • 26. 26 Challenge: How to identify and authenticate bank’s clients to ensure a user-friendly but highly secure access to banking services? AssecoAuthenticationSolution multi-factor authtenticaton solution wide range of strong authentication methods high security - hardware or software tokens https://sxs.asseco.com/
  • 27. 27 Functionalities ADMINISTRATION • User management • Device management • Authentication properties configuration • Administrator management REPORTING • Token data • User data • Audit log • Admin user data AUTHENTICATION • Multi-factor authentication • Sign What You See • Biometrics • QR code authentication • Push authentication SXS SUPPORTS A WIDE RANGE OF AUTHENTICATION METHODS AND ADMINISTRATION FUNCTIONS
  • 28. 28 Functionalities SELF-ADMINISTRATION • Change PIN • Enrollement • Migration • Token reset • Token management ADDITIONAL • Offline and online mode of work • Multiple devices per user • User unlocks his mobile token with PIN (which is not stored on the device) AUTHENTICATION METHODS • OTP, transaction signing, challange/response • Biometrics • QR code authentication • Push authentication (HMS also) • PIN hint BUILDING „ON-THE-GO” MOBILE USER IDENTITY WITH SECURITY BASED TECHNOLOGY
  • 30. 30 IDENTITY AND ACCESS MANAGEMENT IDENTITY ACCESS Identity lifecycle Roles and groupes Process and structure Authentication – who can access Authorization – is respective user authorized to have access
  • 31. 31 Benefits Save time and money Improve IT efficiency -> single place to administer user identity and access rights Reduce time to deliver of applications and services -> no need to reimplement authentication mechanisms across applications and services Enhance security Single point of authentication Control person access to multiple applications at one place Universal monitoring and auditing Authentication monitoring and auditing in one system Enable user behavior analysis and better fraud detection Higher user satisfaction Reducing complexity for end- users, application owners and IT Admins Single sign on (SSO) - access all of the applications and services that person needs by signing in only once using single user account
  • 32. HOW WILL AUTHENTICATION LOOK LIKE The user no longer has to memorize passwords, enter pins, or rewrite codes, his behavior is sufficient to prove his identity. Additionaly, based on the user identity risk, user will be ask for additional authentication.
  • 35. 35
  • 37. Case study – Group Authentication and Mobile banking solution – UniCredit CEE • Project based in Vienna, started 2010. • Private multitenant cloud deployment • 9 countries, consistent UX and branding • Taking care of all authentication needs, compliant to PSD2 and local regulations • Agile development team embedded with Bank • Lower Group TCO for Authentication • Innovative functionalities and technology available to all subsidiaries
  • 38. Case study – Group Authentication and Mobile banking solution – Intesa Sanpaolo – Project Digical • Project based in Milano, started 2016. • Private multitenant cloud deployment • 5 countries, consistent UX and branding, others planned • Agile development team embedded with Bank • Lower Group TCO for Authentication • Supporting different HW token devices in subsidiaries
  • 39. 39 • Smooth PSD2 transition! Erste Apps running with our SDK
  • 41. 41 Why is authentication needed for remote work? 99.9% Of attacks can be blocked with multi- factor authentication. Source: Microsoft Most data breaches involve weak, default, or stolen passwords. Source: Verizon, Telesign, Igloo 81% of breaches are caused by credential teft 73% of passwords are duplicates 50% of employees use apps that aren’t approved by enterprise
  • 42. 42 Why is authentication needed for remote work?
  • 43. 43 Existing clients • New, internal use cases initiated • 10% of existing clients asked for a remote work authentication solution in last 6 months New clients • 50% of all authentication inquiries asking for remote work solution from the start • Smaller players now need secure solutions for remote work also Partners • „Adapt or die” surrounding • Offering new business models as a solution End users • Looking for more security in remote work mode • Striving to easy access and seamless UI Market trends from Asseco point of view
  • 44. 44 All in one solution •Same solution for clients and employees •Applicable to corporations as well as to SMEs •Optional features for specific requirements Variety of authentication methods •From SMS to behavior biometrics •No vendor lock-in •Regulation compliant and market proven Adjustable products •SDK or full application for mToken •Customizable application •Modular solution architecture Adjustable business models •Perpetual or subscription •Monthly or yearly subscription •Subscription based on active users- pay as you grow How Asseco can improve security for remote work?
  • 46. 46 Your organization: Staying secure in the era of impatient customers – you can do it! Beheviour authentication with less friction will improve your business Cut the cost and improve the user experience? It does not have to be a trade off Optimizing authentication on all your channels can be done with singe UX Remote work in (post) COVID19 era: you can make it secure
  • 47. Let’s continue talking. 47 asseco.com Robert Mihaljek Sales Manager, International Markets robert.mihaljek@asseco-see.hr asseco.com/see
  • 48. 48
  • 49. Legal disclaimer The content presented in this presentation is subject to copyright protection and has the ownership title. Texts, graphics, photographs, sound, animations and videos as well as their distribution in the presentation are protected under the Copyright and related rights Law. Unauthorized use of any material contained in the presentation herein may constitute an infringement of copyright, trademark or other laws. The materials in this presentation may not be modified, copied, publicly presented, executed, distributed or used for any other public or commercial purposes, unless the Board of Asseco Poland S.A. gives consent in writing. Copying for any purpose, including commercial use, distribution, modification or acquisition of the contents of this presentation by third parties is prohibited. Moreover, this presentation may contain reference to third-party offers and services. Terms of use for such offers and services are defined by these entities. Asseco Poland S.A. assumes no responsibility for the conditions, contents and effects of the use of offers and services of these entities. The data and information contained in this presentation are for information purposes only. Presentation was prepared with the use of Inscale company products. The name and logo of Asseco Poland S.A. are registered trademarks. Use of these marks requires prior express agreement of Asseco Poland S.A. 2016 © Asseco Poland S.A.