Webinar: Three Steps to Transform Your Mobile App into a Security Factor

Ping Identity
Ping IdentityPing Identity
THREE STEPS TO
TRANSFORM YOUR
MOBILE APP INTO A
SECURITY FACTOR
August, 2017
1 Copyright ©2017 Ping Identity Corporation. All rights reserved.
SECURE & CONVENIENT INTERACTIONS
Customer Security
Two-factor authentication is
increasingly important [for CIAM]
Copyright ©2017 Ping Identity Corporation. All rights reserved.2
“
“
Customer Experience
Customers have a low tolerance
for poor user experience
“
“
Security
Customer
Experience
WHAT DOES YOUR APP LOOK LIKE TODAY?
Copyright ©2017 Ping Identity Corporation. All rights reserved.3
Communication Channel Authentication Flows
A
YOUR APP CAN BE SOMETHING ELSE
…a security factor
§  More secure than SMS
§  Benefits beyond mobile
§  Brand preservation
§  Convenient and secure
4 Copyright ©2017 Ping Identity Corporation. All rights reserved.
CREATING A TRUSTED DEVICE
Copyright ©2017 Ping Identity Corporation. All rights reserved.5
§  Your app has
access to device
secrets
§  Device secrets
associated with
a user, create a
trusted device
§  Device secrets
are secure
A
******Device Secrets
Your Server
and Database
WHY IS A TRUSTED DEVICE MORE SECURE
than SMS?
6 Copyright ©2017 Ping Identity Corporation. All rights reserved.
SMS text messages
are often the
weakest link in
two-step logins.
~www.wired.com
“ “
An out-of-band secret sent
via SMS is received by an
attacker who has
convinced the mobile
operator to redirect the
victim’s mobile phone to
the attacker.
~National Institute for Standards & Technology
“
“
WHY IS A TRUSTED DEVICE MORE SECURE
than SMS?
Copyright ©2017 Ping Identity Corporation. All rights reserved.7
Credentials Stolen
•  Phishing
•  Brute Force
•  Password Reuse
Number spoofed
SMS intercepted
Off-brand
experience for user
verification
Hacker
authenticated
Credentials verified
Sends credentials
4a
Mobile App
Hosting Server
WHY IS A TRUSTED DEVICE MORE SECURE
than Email?
Copyright ©2017 Ping Identity Corporation. All rights reserved.8
Credentials Stolen
•  Phishing
•  Brute Force
•  Password Reuse
Hacker uses stolen
credentials to
access email
Clunky, multi-step
process for user
verification
Hacker
authenticated
Credentials verified
Sends credentials
4a
Mobile App
Hosting Server
WHY IS A TRUSTED DEVICE MORE SECURE?
Device Secrets!
Copyright ©2017 Ping Identity Corporation. All rights reserved.9
Credentials Stolen
•  Phishing
•  Brute Force
•  Password Reuse
Deny
Touch ID for “Your App”
A New Device is Attempting to Login
Seamless, secure
user experience
Credentials verified
Device secrets not
verified
Hacker access
denied
Sends credentials &
device secretsMobile App
Hosting Server
WHAT ABOUT MULTIPLE TRUSTED DEVICES?
Copyright ©2017 Ping Identity Corporation. All rights reserved.10
Primary Device
Other Trusted Devices
•  Shared Smart Phones
•  Shared Tablets
•  Secondary Devices
Primary Device
Trusted iOS Tablet
Trusted Android Tablet
•  Add New Devices
•  Block Devices
•  Change Primary Device
Delegated Device Admin
UTILIZE YOUR MOBILE APP FOR:
ü  Web authentications
ü  Device-based, mobile
authentications
ü  Transaction approvals
ü  Identity verifications by CSRs
ü  Password resets
ü  Many more!
Copyright ©2017 Ping Identity Corporation. All rights reserved.11
TO START: DISCONNECTION
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.12
TRUSTED DEVICE AS A FACTOR
§  A trusted app on a trusted
device buys you
–  ”something you have”
–  A feedback loop
–  An anchor for trust
§  The user becomes part of the
process
–  Can verify transactions
–  Can notify on fraud
Copyright ©2017 Ping Identity Corporation. All rights reserved.13
A
THE GOAL
Copyright ©2017 Ping Identity Corporation. All rights reserved.14
THREE STEPS TO APP AS A FACTOR
1.  Enrollment
–  What is your strategy to
turn on a trusted device
2.  Execution
–  How will you use the
feedback loop
3.  Emergencies
–  What happens when things
go wrong
–  Offline, theft
Copyright ©2017 Ping Identity Corporation. All rights reserved.15
STEP 1: ENROLLMENT
§  Several models to
choose from:
–  Opt-in in app
–  Opt-in in preferences
–  Required choice of
factors
–  Passive enrollment
›  The default with email
& SMS
Copyright ©2017 Ping Identity Corporation. All rights reserved.16
STEP 2: EXECUTION
Copyright ©2017 Ping Identity Corporation. All rights reserved.17
§  Login time:
–  Browser à Device
›  Interaction at web
authentication
–  Device à Device
›  Interaction at app installation
–  Single Device – check for trust
§  Transaction time
–  Purchase
–  Consent
§  Management Time
STEP 3: EMERGENCIES
§  99.99% of the time,
these kinds of security
factors are transparent.
§  0.01% of the time they
are the face of your
organization
§  Plan for the 0.01%
Copyright ©2017 Ping Identity Corporation. All rights reserved.18
LOST A PASSWORD
Copyright ©2017 Ping Identity Corporation. All rights reserved.19
ON AN AIRPLANE
Copyright ©2017 Ping Identity Corporation. All rights reserved.20
Trusted Device not Found
Shopco app
Note: I mocked this up but the underlying functionality exists
LOST DEVICE
21
§  Trusted secondary devices can be promoted
LOST IT ALL
§  Email recovery becomes
the bottom of the sieve
–  SMS is problematic when
coupled with device theft
§  Majority of customers are
able to use self-service
options
Copyright ©2017 Ping Identity Corporation. All rights reserved.22
SUMMARY
§  Converting your app into a security factor is not
difficult but it takes planning
§  Advantages are huge and the organization has a
lot of control over how the user participates
§  Be sure to spend time on failure cases, but don’t
forget the large population that can navigate in a
completely self-service and secure way
Copyright ©2017 Ping Identity Corporation. All rights reserved.23
SEE A FULL DEMO OF PINGID
DEMO LINK:
https://www.pingidentity.com/en/resources/client-library/webinars/2017/PingID-sdk-multi-factor-authentication-for-customers.html
Copyright ©2017 Ping Identity Corporation. All rights reserved.24
25
Q&A
1 von 25

Recomendados

Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA... von
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
1.4K views42 Folien
Standard Based API Security, Access Control and AI Based Attack - API Days Pa... von
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
1.3K views50 Folien
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance von
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
803 views38 Folien
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018) von
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
1.1K views25 Folien
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass von
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
531 views62 Folien
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ... von
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
718 views19 Folien

Más contenido relacionado

Was ist angesagt?

Catalyst 2015: Patrick Harding von
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
1.7K views36 Folien
You Can't Spell Enterprise Security without MFA von
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
1.4K views46 Folien
Connecting The Real World With The Virtual World von
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
1.4K views27 Folien
9.35am robert humphrey von
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphreyArgyle Executive Forum
1.4K views25 Folien
Identity-Defined Privacay & Security for Internet of Things von
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
1.2K views38 Folien
The Case For Next Generation IAM von
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
3.7K views30 Folien

Was ist angesagt?(20)

Catalyst 2015: Patrick Harding von Ping Identity
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity1.7K views
You Can't Spell Enterprise Security without MFA von Ping Identity
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity1.4K views
Connecting The Real World With The Virtual World von Ping Identity
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity1.4K views
Identity-Defined Privacay & Security for Internet of Things von Ping Identity
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
Ping Identity1.2K views
The Case For Next Generation IAM von Patrick Harding
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
Patrick Harding3.7K views
Security On The Edge - A New Way To Think About Securing the Internet of Things von ForgeRock
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
ForgeRock478 views
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud. von ForgeRock
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
ForgeRock525 views
Identity Live Sydney 2017 - Michael Dowling von ForgeRock
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
ForgeRock605 views
Identity's Role in a Zero Trust Strategy von Okta-Inc
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
Okta-Inc2.4K views
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017 von ForgeRock
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
ForgeRock987 views
API Security Needs AI Now More Than Ever von Ping Identity
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
Ping Identity2.8K views
Clear and Present Danger von Ping Identity
Clear and Present DangerClear and Present Danger
Clear and Present Danger
Ping Identity4.7K views
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W... von Ping Identity
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity19.1K views
Three ways-zero-trust-security-redefines-partner-access-v8 von Zscaler
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
Zscaler525 views
Optimize Your Zero Trust Infrastructure von Ping Identity
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
Ping Identity157 views
Sacon - IoT Hackfest (Sri Chakradhar K) von Priyanka Aash
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
Priyanka Aash2.6K views
Okta Digital Enterprise Report von Okta-Inc
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
Okta-Inc732 views
SWM_WP_MaturityModel_July15 von Mike Lemons
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
Mike Lemons320 views
Identity and Access Management from Microsoft and Razor Technology von David J Rosenthal
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology

Similar a Webinar: Three Steps to Transform Your Mobile App into a Security Factor

Mobile Payment Security with CA Rapid App Security von
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
617 views21 Folien
Identity Live Paris 2017 | Monetising Digital Customer Relationships von
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
206 views26 Folien
5 Mobile App Security MUST-DOs in 2018 von
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
1.2K views35 Folien
CIS14: PingID von
CIS14: PingIDCIS14: PingID
CIS14: PingIDCloudIDSummit
1.3K views29 Folien
Identity Live Sydney 2017 - Daniel Raskin von
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
352 views15 Folien
Ping Identity: Corporate Overview Financial Services von
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
236 views20 Folien

Similar a Webinar: Three Steps to Transform Your Mobile App into a Security Factor(20)

Mobile Payment Security with CA Rapid App Security von CA Technologies
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
CA Technologies617 views
Identity Live Paris 2017 | Monetising Digital Customer Relationships von ForgeRock
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock206 views
5 Mobile App Security MUST-DOs in 2018 von NowSecure
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
NowSecure1.2K views
Identity Live Sydney 2017 - Daniel Raskin von ForgeRock
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock352 views
Ping Identity: Corporate Overview Financial Services von Benjamin Canner
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
Benjamin Canner236 views
Mobilize your workforce with secure identity services von Sumana Mehta
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta711 views
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil... von NowSecure
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
NowSecure1.4K views
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries von NowSecure
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure489 views
Eliminating Passwords with Biometrics for Identity Access Management Webinar von Veridium
Eliminating Passwords with Biometrics for Identity Access Management WebinarEliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Veridium339 views
Flexera Software's Why von Flexera
Flexera Software's Why Flexera Software's Why
Flexera Software's Why
Flexera603 views
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence von NowSecure
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
NowSecure742 views
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf von ForgeRock
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock376 views
Why you need to secure mobile apps - now von Symantec
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Symantec1.3K views
Vetting Mobile Apps for Corporate Use: Security Essentials von NowSecure
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
NowSecure529 views
Mitigating the Top 5 Cloud Security Threats von Bitglass
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
Bitglass353 views
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 von FinTech Belgium
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
FinTech Belgium189 views
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan... von CA API Management
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management3.1K views

Más de Ping Identity

Healthcare Patient Experiences Matter von
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
376 views1 Folie
Ping’s Technology Partner Program von
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner ProgramPing Identity
210 views1 Folie
Remote Work Fuels Zero Trust Growth von
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthPing Identity
176 views1 Folie
Identity Verification: Who’s Really There? von
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There? Ping Identity
249 views1 Folie
Extraordinary Financial Customer Experiences von
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesPing Identity
159 views1 Folie
Extraordinary Retail Customer Experiences von
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesPing Identity
76 views1 Folie

Más de Ping Identity(17)

Healthcare Patient Experiences Matter von Ping Identity
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
Ping Identity376 views
Ping’s Technology Partner Program von Ping Identity
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
Ping Identity210 views
Remote Work Fuels Zero Trust Growth von Ping Identity
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
Ping Identity176 views
Identity Verification: Who’s Really There? von Ping Identity
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
Ping Identity249 views
Extraordinary Financial Customer Experiences von Ping Identity
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
Ping Identity159 views
Extraordinary Retail Customer Experiences von Ping Identity
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
Ping Identity76 views
Security Practices: The Generational Gap | Infographic von Ping Identity
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
Ping Identity2.1K views
Security Concerns Around the World | Infographic von Ping Identity
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
Ping Identity1.1K views
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES von Ping Identity
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
Ping Identity338 views
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? von Ping Identity
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
Ping Identity159 views
Consumer Attitudes in a Post-breach Era: The Geographical Gap von Ping Identity
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Ping Identity905 views
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS von Ping Identity
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
Ping Identity313 views
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap von Ping Identity
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
Ping Identity827 views
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F... von Ping Identity
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
Ping Identity120 views
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy von Ping Identity
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Ping Identity1.2K views
Digital Transformation and the Role of IAM von Ping Identity
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
Ping Identity3.9K views
How Aligned Are IT, Employees and Security Practices in Today's Mobile World? von Ping Identity
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity3.2K views

Último

Java Platform Approach 1.0 - Picnic Meetup von
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic MeetupRick Ossendrijver
25 views39 Folien
SAP Automation Using Bar Code and FIORI.pdf von
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 Folien
.conf Go 2023 - Data analysis as a routine von
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
93 views12 Folien
AI: mind, matter, meaning, metaphors, being, becoming, life values von
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life valuesTwain Liu 刘秋艳
35 views16 Folien
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
75 views64 Folien
Black and White Modern Science Presentation.pptx von
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptxmaryamkhalid2916
14 views21 Folien

Último(20)

.conf Go 2023 - Data analysis as a routine von Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
AI: mind, matter, meaning, metaphors, being, becoming, life values von Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life values
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 views
Black and White Modern Science Presentation.pptx von maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... von NUS-ISS
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS37 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze von NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 views
Future of Learning - Khoong Chan Meng von NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 views

Webinar: Three Steps to Transform Your Mobile App into a Security Factor

  • 1. THREE STEPS TO TRANSFORM YOUR MOBILE APP INTO A SECURITY FACTOR August, 2017 1 Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 2. SECURE & CONVENIENT INTERACTIONS Customer Security Two-factor authentication is increasingly important [for CIAM] Copyright ©2017 Ping Identity Corporation. All rights reserved.2 “ “ Customer Experience Customers have a low tolerance for poor user experience “ “ Security Customer Experience
  • 3. WHAT DOES YOUR APP LOOK LIKE TODAY? Copyright ©2017 Ping Identity Corporation. All rights reserved.3 Communication Channel Authentication Flows A
  • 4. YOUR APP CAN BE SOMETHING ELSE …a security factor §  More secure than SMS §  Benefits beyond mobile §  Brand preservation §  Convenient and secure 4 Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 5. CREATING A TRUSTED DEVICE Copyright ©2017 Ping Identity Corporation. All rights reserved.5 §  Your app has access to device secrets §  Device secrets associated with a user, create a trusted device §  Device secrets are secure A ******Device Secrets Your Server and Database
  • 6. WHY IS A TRUSTED DEVICE MORE SECURE than SMS? 6 Copyright ©2017 Ping Identity Corporation. All rights reserved. SMS text messages are often the weakest link in two-step logins. ~www.wired.com “ “ An out-of-band secret sent via SMS is received by an attacker who has convinced the mobile operator to redirect the victim’s mobile phone to the attacker. ~National Institute for Standards & Technology “ “
  • 7. WHY IS A TRUSTED DEVICE MORE SECURE than SMS? Copyright ©2017 Ping Identity Corporation. All rights reserved.7 Credentials Stolen •  Phishing •  Brute Force •  Password Reuse Number spoofed SMS intercepted Off-brand experience for user verification Hacker authenticated Credentials verified Sends credentials 4a Mobile App Hosting Server
  • 8. WHY IS A TRUSTED DEVICE MORE SECURE than Email? Copyright ©2017 Ping Identity Corporation. All rights reserved.8 Credentials Stolen •  Phishing •  Brute Force •  Password Reuse Hacker uses stolen credentials to access email Clunky, multi-step process for user verification Hacker authenticated Credentials verified Sends credentials 4a Mobile App Hosting Server
  • 9. WHY IS A TRUSTED DEVICE MORE SECURE? Device Secrets! Copyright ©2017 Ping Identity Corporation. All rights reserved.9 Credentials Stolen •  Phishing •  Brute Force •  Password Reuse Deny Touch ID for “Your App” A New Device is Attempting to Login Seamless, secure user experience Credentials verified Device secrets not verified Hacker access denied Sends credentials & device secretsMobile App Hosting Server
  • 10. WHAT ABOUT MULTIPLE TRUSTED DEVICES? Copyright ©2017 Ping Identity Corporation. All rights reserved.10 Primary Device Other Trusted Devices •  Shared Smart Phones •  Shared Tablets •  Secondary Devices Primary Device Trusted iOS Tablet Trusted Android Tablet •  Add New Devices •  Block Devices •  Change Primary Device Delegated Device Admin
  • 11. UTILIZE YOUR MOBILE APP FOR: ü  Web authentications ü  Device-based, mobile authentications ü  Transaction approvals ü  Identity verifications by CSRs ü  Password resets ü  Many more! Copyright ©2017 Ping Identity Corporation. All rights reserved.11
  • 12. TO START: DISCONNECTION Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.12
  • 13. TRUSTED DEVICE AS A FACTOR §  A trusted app on a trusted device buys you –  ”something you have” –  A feedback loop –  An anchor for trust §  The user becomes part of the process –  Can verify transactions –  Can notify on fraud Copyright ©2017 Ping Identity Corporation. All rights reserved.13 A
  • 14. THE GOAL Copyright ©2017 Ping Identity Corporation. All rights reserved.14
  • 15. THREE STEPS TO APP AS A FACTOR 1.  Enrollment –  What is your strategy to turn on a trusted device 2.  Execution –  How will you use the feedback loop 3.  Emergencies –  What happens when things go wrong –  Offline, theft Copyright ©2017 Ping Identity Corporation. All rights reserved.15
  • 16. STEP 1: ENROLLMENT §  Several models to choose from: –  Opt-in in app –  Opt-in in preferences –  Required choice of factors –  Passive enrollment ›  The default with email & SMS Copyright ©2017 Ping Identity Corporation. All rights reserved.16
  • 17. STEP 2: EXECUTION Copyright ©2017 Ping Identity Corporation. All rights reserved.17 §  Login time: –  Browser à Device ›  Interaction at web authentication –  Device à Device ›  Interaction at app installation –  Single Device – check for trust §  Transaction time –  Purchase –  Consent §  Management Time
  • 18. STEP 3: EMERGENCIES §  99.99% of the time, these kinds of security factors are transparent. §  0.01% of the time they are the face of your organization §  Plan for the 0.01% Copyright ©2017 Ping Identity Corporation. All rights reserved.18
  • 19. LOST A PASSWORD Copyright ©2017 Ping Identity Corporation. All rights reserved.19
  • 20. ON AN AIRPLANE Copyright ©2017 Ping Identity Corporation. All rights reserved.20 Trusted Device not Found Shopco app Note: I mocked this up but the underlying functionality exists
  • 21. LOST DEVICE 21 §  Trusted secondary devices can be promoted
  • 22. LOST IT ALL §  Email recovery becomes the bottom of the sieve –  SMS is problematic when coupled with device theft §  Majority of customers are able to use self-service options Copyright ©2017 Ping Identity Corporation. All rights reserved.22
  • 23. SUMMARY §  Converting your app into a security factor is not difficult but it takes planning §  Advantages are huge and the organization has a lot of control over how the user participates §  Be sure to spend time on failure cases, but don’t forget the large population that can navigate in a completely self-service and secure way Copyright ©2017 Ping Identity Corporation. All rights reserved.23
  • 24. SEE A FULL DEMO OF PINGID DEMO LINK: https://www.pingidentity.com/en/resources/client-library/webinars/2017/PingID-sdk-multi-factor-authentication-for-customers.html Copyright ©2017 Ping Identity Corporation. All rights reserved.24