SlideShare ist ein Scribd-Unternehmen logo
1 von 41
TekMonks
LoginCat Security Software
1
2
Introduction
Today’s Security Challenges
Issues with current solutions
LoginCat: Secure by Design / How we secure ourselves
LoginCat: How we secure you
Summary
Agenda
• TekMonks is a global, full service, fast growing, and highly skilled
software technology firm.
• We have operations in 6 countries, and 3 continents.
• Experience in multiple industry verticals – including Government,
Finance, Health, and Transportation.
• Working with the largest Fortune 100 firms and governments
worldwide
TekMonks – A bit about us
3
4
Key Theme
A brief overview of the Cybersecurity
Challenges
• In 2016, 89% of breaches had a financial or espionage motive.
• 95% of all web app breaches were financially motivated.
• There were 10,489 insider and privilege misuse based hacks
in 2016. These caused the most damage which could take
months or years to heal.
• Approximately 85% of hacks are external actors, and 15% are internal, but internal
ones are most devastating.
• Majority of attacks use phishing and known vulnerabilities in the security appliances
to steal the initial credentials, that is VPN or Corporate Login passwords.
• 82% of all Cyberattacks started with stealing credentials which is password theft.
Hackers then quickly walk across the VPN / Firewall door using legit stolen
credentials.
*All data from 2016 Data Breach Investigations Report
Cybersecurity – Some startling facts…*
5
Why am I being attacked … Money + Spying
6
External vs Internal Attacks…
7
• It takes days for an attacker to “exfiltrate” data – i.e. steal valuable data post attack. It is not the
initial breach per-se which causes damage, it is this step of stealing valuable company data –
where the attacker is then compromising internal systems and stealing data from them. This step
takes days to succeed. It is not instantaneous, but it doesn’t take 3 or 6 months either.
Cybersecurity – time is not on our side…
8
• Time to compromise is systems is trending down, time to detect is trending up.
Most hackers are able to get in, hide effectively, and then steal corporate data
from internal applications, undetected and unchallenged!
Cybersecurity – Some startling facts…
9
• Almost 100% of phishing attacks used to steal credentials and secrets (passwords). 30% of
Phishing messages are opened, and 12% are successful in installing malware, a very large number.
Credential Theft – Phishing Statistics
10
Anatomy of a typical cyberattack – 2016 Data
11
$280 Billion
Total loss to businesses from Cyber-attacks in 2016*2
$2.1 Trillion
Estimated Cyber Losses in 2019*2
$74.54 Billion – Google’s 2015 Revenue
Hacking industry is a business that is 3.75 times bigger than Google! Hackers today
are a well funded multi-Billion dollar illegal corporations with significant computing
and research power, all dedicated to hacking you for profits.
Cybersecurity – Yes it is a serious situation
12*2 Forbes: http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#2e21dd3f3bb0
13
Key Theme
Issues with the current solutions
• The continued, high frequency of successful cyberattacks against today’s enterprises has
made it abundantly clear that traditional, perimeter-centric security strategies e.g.
Firewalls, VPNs, while necessary, are no longer sufficient.
• When a hacker manages to breach them it is much easier to
hide and hack the internal core business applications and
assets. An internal, application layer security solution is needed.
• Internal applications, which run core business today, were designed 10 years ago, or 5
years ago, even 3 years ago – we are in a different world today.
• Rewriting core business applications is not a solution – plus it is a cat and mouse game,
by the time they are rewritten, security threats and standards would have evolved.
Network layer security: Necessary but not sufficient
14
Anatomy of a typical cyberattack – 2016 Data
15
16
A short analysis of the hacker
landscape
Just why are things getting worse?
Why do hackers succeed more easily lately?
Or – what’s the cause, and thus, the solution
to stop these hacks.
• Two words: Very easy, even the complicated ones
Commonly used strategies (2016 data):
• Keyloggers – when they work are the easiest
• Rainbow tables – Hack passwords as a service
• http://project-rainbowcrack.com/table.htm
• 6 TB of Rainbow tables ; can crack all characters on keyboard
• GPU based cracking - much faster than using CPUs, using massive
parallelization - a home built GPU cluster can crack every Windows
password in less than 6 hours. http://goo.gl/mU5EFB
17
Just how easy are IDs and passwords to hack?
• Crackers today are really efficient at breaking passwords.
• Deep Blue Supercomputer - around 1999 - beat Garry Kasparov - 11.38 GFLOPS.
• Samsung Galaxy S7 with SnapDragon 820 packs 498.5 GFLOPS. Your Samsung
Smartphone is approximately 44 times faster than the Deep Blue
Supercomputer.
• On Desktop Radeon R9 Fury X2 = 17,204 GLOPS. 1,511 times faster than Deep
Blue.
• Hackers routinely build rigs with up to 25 of these GPUs, which is 430 TeraFLOPS.
https://goo.gl/1nVst6. This is same power as Blue Gene Supercomputer at
Livermore Nuclear Laboratory to simulate nuclear reactions.
• If one thinks passwords are secure because decrypting them will take a lot of
computing power – one is not living in the reality of 2016.
18
Just how easy are passwords to hack?
19
Password Cracking Rigs
• Biometric and Thumb? Every thing you touch will now contain your password.
This is one of the easiest "security measures" to break. There are at least 7
different currently known ways to defeat this. For example, simple inkjets can be
used to defeat fingerprint based authentication.
• Iris Scanning? Megapixel cameras can steal your Iris patterns.
• Facial Identification? Face masks take care of defeating this security measure.
• Token / RSA? No longer secure. Quantum computers can hack it very easily. US
Government has already abandoned it. MIT has already developed a Quantum
Computer capable of easily hacking RSA.
What about other technologies? Biometrics?
20
21
LoginCat
Part 1: How do we secure ourselves first?
• First we eliminates passwords.
• Pass phrase based authentication – Mathematically proven to be extremely hard to hack,
even with today’s computing power.
• Human brains can’t remember good passwords e.g. $@)Nq;F*(.JRwd#$ , but even babies
learn to put together two or three words quickly and make short sentences
• Second we eliminates User IDs as well. No hack targets, zero exposure, zero trust.
• Third – Deep algorithm based edge security which stops hackers from even trying to attempt
a hack.
• Finally, quantum computing resistant – No use of asymmetric keys which are easily hacked
by Quantum computers.
Securing LoginCat
22
As the processing speed of computers has increased, passwords are notoriously
easy to hack. 8 character passwords take 15 hours at most to hack these days.
Secure by design – End of Passwords
23
LoginCat exclusively uses pass phrases instead of passwords. Pass phrases are next
to impossible to crack, even with the fastest computers today and tomorrow!
Secure by design – Pass Phrases
24
• Most attempts to hack a User ID start with – knowing a User ID.
• A User ID is like painting a target sign on
your back. Hackers gain access to accounts
by targeting User IDs first.
• LoginCat eliminates using User ID for logins.
This significantly reduces the attack surface very significantly.
• Specific user accounts can no longer be targeted for hacking attacks.
Secure by design – End of User ID
25
• Edge of network security features.
• Deep AI based security algorithms – beyond IP
firewalls LoginCat will analyze incoming login
attempts and ban hackers using AI algorithms.
• Some examples
• Hacker with incorrect digital signature
• Pattern analysis of incoming request headers to ban distributed attacks, for example same
request headers from multiple IPs, will trigger off the DDoS attack prevention monitor.
• Successful login from unknown locations, or locations that don’t match mobile devices.,
login times which don’t match habits, etc.
Secure by design – Edge of network AI based hack detection
26
• All current security token based solutions are prone to Quantum attacks. This is
because technologies like RSA etc. are based on
factorization series problems which Quantum
computers can solve and decrypt instantaneously.
• US Government already requires all authentication
methods to be Quantum resistant. Quantum
computing is becoming mainstream, e.g. IBM
provides Quantum computing as a cloud service.
http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf
• Both the single and two factor authentication methods used in LoginCat are resistant
to being hacked by Quantum computers – as we don’t use Token based
authentication schemes. We are safe today – and ready for tomorrow!
Future resistant – Resistant to Quantum attacks
27
28
LoginCat
Part 2: How do we secure existing internal
and cloud applications?
• Approximately 85% of hacks are external actors, and 15% are internal, but internal ones
are most devastating.
• Majority of attacks use phishing and known vulnerabilities in the security appliances to
steal the initial credentials, that is VPN or Corporate Login passwords.
• 82% of all Cyberattacks started with stealing credentials which is password theft. Hackers
then quickly walk across the VPN / Firewall door using legit stolen credentials.
• They then steal credentials for internal applications, databases by using password crackers
– while staying hidden on the internal network.
Core Problem
• How do we secure existing applications, which were written in a different security
landscape, use insecure logins and algorithms SHA1, SHA5 or even MD5? We thought we
could hide them behind a firewall but clearly that doesn’t work when the hacker is inside!
Quick Recap – From 2016 Data
29
Anatomy of a typical cyberattack – 2016 Data
30
• True Zero Trust – Assume there is an unwanted hacker either an outside
actor (85% of the time) who has gotten past the firewalls and VPNs, or an
internal actor (15% of the times) and they are trying to hack into internal
applications. To steal valuable corporate data – this is the ends to every
hack attack.
• A Cybersecurity solution is required to fight such attacks pro-actively,
instead of depending on passive measures. This solution should be zero
trust, and work at the application layer, and would be great if it secures
existing applications, without requiring modifications.
This is what LoginCat does.
31
Zero Trust and Application Layer Level Cybersecurity
LoginCat Protection – 2016 Data
32
• LoginCat secures the User’s ID and passwords across all internal applications, without having to modify
them.
• Remember hackers are getting in via cracking passwords. How do we typically get around this? Password
policy that says change passwords every 3 months – but it takes hackers days, not 3 months.
• LoginCat will automatically, and frequently change the associated login credentials (passwords) for
example every 6 hours.
• Further LoginCat will automatically generate the toughest passwords possible. This makes it harder to
hack the accounts, while creating a constantly moving target for the hackers.
• LoginCat comes with a built in SSO solution which works across all major Cloud and in-house
applications. Users no longer need to be aware of their constantly changing passwords, since LoginCat
will log them into the end systems.
• When an application is hacked, LoginCat will either lock out the attackers automatically by changing the
credentials – or detect the hack (if the hacker has locked the account) – either way preventing damages.
Secure by design – Credential Management
33
• LoginCat scripting based authentication adapters will work with all your existing
applications – Web based, terminal or cloud.
• For the first time have a unified security policy across internal applications and the
cloud.
• No changes needed to existing applications. Do they use MD5? SHA1? We still secure
them without having to recode them.
• We manage the passwords, change them on a frequent basis, making your existing
application un-hackable, and quickly detect any hack attempts.
• Appliance or Cloud Based – bring us on premise with an appliance, or run LoginCat via
from our hosted cloud.
34
Easily integrate to your existing applications – Cloud or
Appliance
• User ID provisioning and instant locking from all internal applications, if
needed.
• Constantly updated – TekMonks will provide firmware updates to include
latest security and AI algorithms to protect against emerging threats.
• Both mobile (iOS and Android) and web based.
• Readily auditable – provides entire audit history of who logged in, when did
someone access an internal application, how long they were active, their IP,
mobile or web based access and even their location!
35
Other Benefits
36
Demo
37
Summary
• A secure by design solution.
• No User ID equals no easy way in. No way to target an individual.
• Pass phrases – mathematically impossible to crack.
• AI based Algorithmic security to stop hackers from even trying.
• Works will all your existing applications – Cloud or Appliance based
solution. The only affordable way to add security to existing applications.
Secure by design, from ground up
38
• Cybersecurity and cyber attacks are the top issues for any government or
corporate IT department.
• Hackers are increasingly professional, well funded and causing billions of
dollars in losses.
• LoginCat provides a secure, easily Integra table, managed environment
which is designed ground up to secure existing applications.
Can You Afford Not To?
39
Demo.
Technology and business IT assessment.
Solution proposal.
Next Steps
40
THANK YOU
41

Weitere ähnliche Inhalte

Was ist angesagt?

The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalImperva
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Priyanka Aash
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communicationscentralohioissa
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecuritySatnam Singh
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Plus Consulting
 

Was ist angesagt? (19)

The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack Survival
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communications
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 

Ähnlich wie Login cat tekmonks - v4

LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini PresentationRohit Kapoor
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeRocket Matter, LLC
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 

Ähnlich wie Login cat tekmonks - v4 (20)

LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 

Kürzlich hochgeladen

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 

Kürzlich hochgeladen (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 

Login cat tekmonks - v4

  • 2. 2 Introduction Today’s Security Challenges Issues with current solutions LoginCat: Secure by Design / How we secure ourselves LoginCat: How we secure you Summary Agenda
  • 3. • TekMonks is a global, full service, fast growing, and highly skilled software technology firm. • We have operations in 6 countries, and 3 continents. • Experience in multiple industry verticals – including Government, Finance, Health, and Transportation. • Working with the largest Fortune 100 firms and governments worldwide TekMonks – A bit about us 3
  • 4. 4 Key Theme A brief overview of the Cybersecurity Challenges
  • 5. • In 2016, 89% of breaches had a financial or espionage motive. • 95% of all web app breaches were financially motivated. • There were 10,489 insider and privilege misuse based hacks in 2016. These caused the most damage which could take months or years to heal. • Approximately 85% of hacks are external actors, and 15% are internal, but internal ones are most devastating. • Majority of attacks use phishing and known vulnerabilities in the security appliances to steal the initial credentials, that is VPN or Corporate Login passwords. • 82% of all Cyberattacks started with stealing credentials which is password theft. Hackers then quickly walk across the VPN / Firewall door using legit stolen credentials. *All data from 2016 Data Breach Investigations Report Cybersecurity – Some startling facts…* 5
  • 6. Why am I being attacked … Money + Spying 6
  • 7. External vs Internal Attacks… 7
  • 8. • It takes days for an attacker to “exfiltrate” data – i.e. steal valuable data post attack. It is not the initial breach per-se which causes damage, it is this step of stealing valuable company data – where the attacker is then compromising internal systems and stealing data from them. This step takes days to succeed. It is not instantaneous, but it doesn’t take 3 or 6 months either. Cybersecurity – time is not on our side… 8
  • 9. • Time to compromise is systems is trending down, time to detect is trending up. Most hackers are able to get in, hide effectively, and then steal corporate data from internal applications, undetected and unchallenged! Cybersecurity – Some startling facts… 9
  • 10. • Almost 100% of phishing attacks used to steal credentials and secrets (passwords). 30% of Phishing messages are opened, and 12% are successful in installing malware, a very large number. Credential Theft – Phishing Statistics 10
  • 11. Anatomy of a typical cyberattack – 2016 Data 11
  • 12. $280 Billion Total loss to businesses from Cyber-attacks in 2016*2 $2.1 Trillion Estimated Cyber Losses in 2019*2 $74.54 Billion – Google’s 2015 Revenue Hacking industry is a business that is 3.75 times bigger than Google! Hackers today are a well funded multi-Billion dollar illegal corporations with significant computing and research power, all dedicated to hacking you for profits. Cybersecurity – Yes it is a serious situation 12*2 Forbes: http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#2e21dd3f3bb0
  • 13. 13 Key Theme Issues with the current solutions
  • 14. • The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies e.g. Firewalls, VPNs, while necessary, are no longer sufficient. • When a hacker manages to breach them it is much easier to hide and hack the internal core business applications and assets. An internal, application layer security solution is needed. • Internal applications, which run core business today, were designed 10 years ago, or 5 years ago, even 3 years ago – we are in a different world today. • Rewriting core business applications is not a solution – plus it is a cat and mouse game, by the time they are rewritten, security threats and standards would have evolved. Network layer security: Necessary but not sufficient 14
  • 15. Anatomy of a typical cyberattack – 2016 Data 15
  • 16. 16 A short analysis of the hacker landscape Just why are things getting worse? Why do hackers succeed more easily lately? Or – what’s the cause, and thus, the solution to stop these hacks.
  • 17. • Two words: Very easy, even the complicated ones Commonly used strategies (2016 data): • Keyloggers – when they work are the easiest • Rainbow tables – Hack passwords as a service • http://project-rainbowcrack.com/table.htm • 6 TB of Rainbow tables ; can crack all characters on keyboard • GPU based cracking - much faster than using CPUs, using massive parallelization - a home built GPU cluster can crack every Windows password in less than 6 hours. http://goo.gl/mU5EFB 17 Just how easy are IDs and passwords to hack?
  • 18. • Crackers today are really efficient at breaking passwords. • Deep Blue Supercomputer - around 1999 - beat Garry Kasparov - 11.38 GFLOPS. • Samsung Galaxy S7 with SnapDragon 820 packs 498.5 GFLOPS. Your Samsung Smartphone is approximately 44 times faster than the Deep Blue Supercomputer. • On Desktop Radeon R9 Fury X2 = 17,204 GLOPS. 1,511 times faster than Deep Blue. • Hackers routinely build rigs with up to 25 of these GPUs, which is 430 TeraFLOPS. https://goo.gl/1nVst6. This is same power as Blue Gene Supercomputer at Livermore Nuclear Laboratory to simulate nuclear reactions. • If one thinks passwords are secure because decrypting them will take a lot of computing power – one is not living in the reality of 2016. 18 Just how easy are passwords to hack?
  • 20. • Biometric and Thumb? Every thing you touch will now contain your password. This is one of the easiest "security measures" to break. There are at least 7 different currently known ways to defeat this. For example, simple inkjets can be used to defeat fingerprint based authentication. • Iris Scanning? Megapixel cameras can steal your Iris patterns. • Facial Identification? Face masks take care of defeating this security measure. • Token / RSA? No longer secure. Quantum computers can hack it very easily. US Government has already abandoned it. MIT has already developed a Quantum Computer capable of easily hacking RSA. What about other technologies? Biometrics? 20
  • 21. 21 LoginCat Part 1: How do we secure ourselves first?
  • 22. • First we eliminates passwords. • Pass phrase based authentication – Mathematically proven to be extremely hard to hack, even with today’s computing power. • Human brains can’t remember good passwords e.g. $@)Nq;F*(.JRwd#$ , but even babies learn to put together two or three words quickly and make short sentences • Second we eliminates User IDs as well. No hack targets, zero exposure, zero trust. • Third – Deep algorithm based edge security which stops hackers from even trying to attempt a hack. • Finally, quantum computing resistant – No use of asymmetric keys which are easily hacked by Quantum computers. Securing LoginCat 22
  • 23. As the processing speed of computers has increased, passwords are notoriously easy to hack. 8 character passwords take 15 hours at most to hack these days. Secure by design – End of Passwords 23
  • 24. LoginCat exclusively uses pass phrases instead of passwords. Pass phrases are next to impossible to crack, even with the fastest computers today and tomorrow! Secure by design – Pass Phrases 24
  • 25. • Most attempts to hack a User ID start with – knowing a User ID. • A User ID is like painting a target sign on your back. Hackers gain access to accounts by targeting User IDs first. • LoginCat eliminates using User ID for logins. This significantly reduces the attack surface very significantly. • Specific user accounts can no longer be targeted for hacking attacks. Secure by design – End of User ID 25
  • 26. • Edge of network security features. • Deep AI based security algorithms – beyond IP firewalls LoginCat will analyze incoming login attempts and ban hackers using AI algorithms. • Some examples • Hacker with incorrect digital signature • Pattern analysis of incoming request headers to ban distributed attacks, for example same request headers from multiple IPs, will trigger off the DDoS attack prevention monitor. • Successful login from unknown locations, or locations that don’t match mobile devices., login times which don’t match habits, etc. Secure by design – Edge of network AI based hack detection 26
  • 27. • All current security token based solutions are prone to Quantum attacks. This is because technologies like RSA etc. are based on factorization series problems which Quantum computers can solve and decrypt instantaneously. • US Government already requires all authentication methods to be Quantum resistant. Quantum computing is becoming mainstream, e.g. IBM provides Quantum computing as a cloud service. http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf • Both the single and two factor authentication methods used in LoginCat are resistant to being hacked by Quantum computers – as we don’t use Token based authentication schemes. We are safe today – and ready for tomorrow! Future resistant – Resistant to Quantum attacks 27
  • 28. 28 LoginCat Part 2: How do we secure existing internal and cloud applications?
  • 29. • Approximately 85% of hacks are external actors, and 15% are internal, but internal ones are most devastating. • Majority of attacks use phishing and known vulnerabilities in the security appliances to steal the initial credentials, that is VPN or Corporate Login passwords. • 82% of all Cyberattacks started with stealing credentials which is password theft. Hackers then quickly walk across the VPN / Firewall door using legit stolen credentials. • They then steal credentials for internal applications, databases by using password crackers – while staying hidden on the internal network. Core Problem • How do we secure existing applications, which were written in a different security landscape, use insecure logins and algorithms SHA1, SHA5 or even MD5? We thought we could hide them behind a firewall but clearly that doesn’t work when the hacker is inside! Quick Recap – From 2016 Data 29
  • 30. Anatomy of a typical cyberattack – 2016 Data 30
  • 31. • True Zero Trust – Assume there is an unwanted hacker either an outside actor (85% of the time) who has gotten past the firewalls and VPNs, or an internal actor (15% of the times) and they are trying to hack into internal applications. To steal valuable corporate data – this is the ends to every hack attack. • A Cybersecurity solution is required to fight such attacks pro-actively, instead of depending on passive measures. This solution should be zero trust, and work at the application layer, and would be great if it secures existing applications, without requiring modifications. This is what LoginCat does. 31 Zero Trust and Application Layer Level Cybersecurity
  • 32. LoginCat Protection – 2016 Data 32
  • 33. • LoginCat secures the User’s ID and passwords across all internal applications, without having to modify them. • Remember hackers are getting in via cracking passwords. How do we typically get around this? Password policy that says change passwords every 3 months – but it takes hackers days, not 3 months. • LoginCat will automatically, and frequently change the associated login credentials (passwords) for example every 6 hours. • Further LoginCat will automatically generate the toughest passwords possible. This makes it harder to hack the accounts, while creating a constantly moving target for the hackers. • LoginCat comes with a built in SSO solution which works across all major Cloud and in-house applications. Users no longer need to be aware of their constantly changing passwords, since LoginCat will log them into the end systems. • When an application is hacked, LoginCat will either lock out the attackers automatically by changing the credentials – or detect the hack (if the hacker has locked the account) – either way preventing damages. Secure by design – Credential Management 33
  • 34. • LoginCat scripting based authentication adapters will work with all your existing applications – Web based, terminal or cloud. • For the first time have a unified security policy across internal applications and the cloud. • No changes needed to existing applications. Do they use MD5? SHA1? We still secure them without having to recode them. • We manage the passwords, change them on a frequent basis, making your existing application un-hackable, and quickly detect any hack attempts. • Appliance or Cloud Based – bring us on premise with an appliance, or run LoginCat via from our hosted cloud. 34 Easily integrate to your existing applications – Cloud or Appliance
  • 35. • User ID provisioning and instant locking from all internal applications, if needed. • Constantly updated – TekMonks will provide firmware updates to include latest security and AI algorithms to protect against emerging threats. • Both mobile (iOS and Android) and web based. • Readily auditable – provides entire audit history of who logged in, when did someone access an internal application, how long they were active, their IP, mobile or web based access and even their location! 35 Other Benefits
  • 38. • A secure by design solution. • No User ID equals no easy way in. No way to target an individual. • Pass phrases – mathematically impossible to crack. • AI based Algorithmic security to stop hackers from even trying. • Works will all your existing applications – Cloud or Appliance based solution. The only affordable way to add security to existing applications. Secure by design, from ground up 38
  • 39. • Cybersecurity and cyber attacks are the top issues for any government or corporate IT department. • Hackers are increasingly professional, well funded and causing billions of dollars in losses. • LoginCat provides a secure, easily Integra table, managed environment which is designed ground up to secure existing applications. Can You Afford Not To? 39
  • 40. Demo. Technology and business IT assessment. Solution proposal. Next Steps 40