SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
1© Copyright 2011 EMC Corporation. All rights reserved.
The Future of Mobile Authentication
Lauren Horaist
Product Marketing, RSA
2© Copyright 2012 EMC Corporation. All rights reserved.
~135-million babies
~712-million smartphones
No wonder Android is
the primary target of
mobile threats…
3© Copyright 2011 EMC Corporation. All rights reserved.
Look Familiar?
4© Copyright 2011 EMC Corporation. All rights reserved.
Cross-Channel Mobile Malware
5© Copyright 2011 EMC Corporation. All rights reserved.
6© Copyright 2011 EMC Corporation. All rights reserved.
7© Copyright 2011 EMC Corporation. All rights reserved.
8© Copyright 2011 EMC Corporation. All rights reserved.
They’re in the App Stores, too
9© Copyright 2011 EMC Corporation. All rights reserved.
So what does this mean?
•  Assume user devices have been
compromised
•  Implement best practices to secure
data on or accessed by the device
•  Enforce strong authentication to
verify user’s true identity
10© Copyright 2011 EMC Corporation. All rights reserved.
Challenges of Mobile Authentication
User Experience a
top priority
Authentication must
be convenient
Policies based on
risk and sensitivity
Device
Profile
Behavior
Profile
Known
Fraud
Risk
Analysis
Result
PASS
FAIL
VERIFY
Ø  Life questions
Ø  Passcode via SMS
Ø  Biometrics
11© Copyright 2011 EMC Corporation. All rights reserved.
voice	
signature	
vein	
finger	
retina	
face	
vein	
retina	
face	
type	
signature	
voice	
face	
AVAILABLE
FOR MOBILE	
MATURE
TECHNOLOGY	
ENABLES STEP
UP	
type	
Researched 30+ biometric solutions	
 Validated & Filtered	
 Evaluated methods	
Biometric Methods For Mobile
signature
12© Copyright 2011 EMC Corporation. All rights reserved.
Accuracy
Usability
Integrations
13© Copyright 2011 EMC Corporation. All rights reserved.
Unlock Access Across Multiple Channels
The Future Is Now

Weitere ähnliche Inhalte

Was ist angesagt? (11)

Smart phone
Smart phoneSmart phone
Smart phone
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Mobile Devices
Mobile DevicesMobile Devices
Mobile Devices
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Harald Neidhardt _fr_02.00_singularity meets the quantified self-the next wav...
Harald Neidhardt _fr_02.00_singularity meets the quantified self-the next wav...Harald Neidhardt _fr_02.00_singularity meets the quantified self-the next wav...
Harald Neidhardt _fr_02.00_singularity meets the quantified self-the next wav...
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print Infographic
 
Smatphone present
Smatphone presentSmatphone present
Smatphone present
 

Andere mochten auch

Mobile Money Regulation
Mobile Money Regulation Mobile Money Regulation
Mobile Money Regulation
BSP Media Group
 
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
spirecorporate
 

Andere mochten auch (6)

Mobile Money Regulation
Mobile Money Regulation Mobile Money Regulation
Mobile Money Regulation
 
Convergence of mobile and financial services implications for regulation of...
Convergence of mobile and financial services   implications for regulation of...Convergence of mobile and financial services   implications for regulation of...
Convergence of mobile and financial services implications for regulation of...
 
POWER OF VIRTUAL MONEY
POWER OF VIRTUAL MONEY POWER OF VIRTUAL MONEY
POWER OF VIRTUAL MONEY
 
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
 
Mobile Payments Framework
Mobile Payments FrameworkMobile Payments Framework
Mobile Payments Framework
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Ähnlich wie Future of Mobile Authentication

The Big Flip: Mobile Apps in Financial Services
The Big Flip: Mobile Apps in Financial ServicesThe Big Flip: Mobile Apps in Financial Services
The Big Flip: Mobile Apps in Financial Services
Relayware
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 

Ähnlich wie Future of Mobile Authentication (20)

Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
The Big Flip: Mobile Apps in Financial Services
The Big Flip: Mobile Apps in Financial ServicesThe Big Flip: Mobile Apps in Financial Services
The Big Flip: Mobile Apps in Financial Services
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Inc pres (dma bristol apps) 24 jun11 v1.1
Inc pres (dma bristol apps) 24 jun11 v1.1Inc pres (dma bristol apps) 24 jun11 v1.1
Inc pres (dma bristol apps) 24 jun11 v1.1
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Mobilize
MobilizeMobilize
Mobilize
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
MobileIron Threat Defense
MobileIron Threat DefenseMobileIron Threat Defense
MobileIron Threat Defense
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Mobile Testing Trends and Innovations
Mobile Testing Trends and InnovationsMobile Testing Trends and Innovations
Mobile Testing Trends and Innovations
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 

Mehr von derektop

Mehr von derektop (12)

Operationalizing Voice Biometrics
Operationalizing Voice BiometricsOperationalizing Voice Biometrics
Operationalizing Voice Biometrics
 
Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0
 
e-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticatione-Government Applications for Voice Authentication
e-Government Applications for Voice Authentication
 
Mobile Voice Authentication
Mobile Voice AuthenticationMobile Voice Authentication
Mobile Voice Authentication
 
The Future of Secure, Mobile Authentication
The Future of Secure, Mobile AuthenticationThe Future of Secure, Mobile Authentication
The Future of Secure, Mobile Authentication
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Case Study: Passive Authentication at Barclays
Case Study: Passive Authentication at BarclaysCase Study: Passive Authentication at Barclays
Case Study: Passive Authentication at Barclays
 
Powering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel WorldPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel World
 
Natural Interaction in the Connected Home
Natural Interaction in the Connected HomeNatural Interaction in the Connected Home
Natural Interaction in the Connected Home
 
Case Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator AveaCase Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator Avea
 
Voice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets BiggerVoice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets Bigger
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Future of Mobile Authentication

  • 1. 1© Copyright 2011 EMC Corporation. All rights reserved. The Future of Mobile Authentication Lauren Horaist Product Marketing, RSA
  • 2. 2© Copyright 2012 EMC Corporation. All rights reserved. ~135-million babies ~712-million smartphones No wonder Android is the primary target of mobile threats…
  • 3. 3© Copyright 2011 EMC Corporation. All rights reserved. Look Familiar?
  • 4. 4© Copyright 2011 EMC Corporation. All rights reserved. Cross-Channel Mobile Malware
  • 5. 5© Copyright 2011 EMC Corporation. All rights reserved.
  • 6. 6© Copyright 2011 EMC Corporation. All rights reserved.
  • 7. 7© Copyright 2011 EMC Corporation. All rights reserved.
  • 8. 8© Copyright 2011 EMC Corporation. All rights reserved. They’re in the App Stores, too
  • 9. 9© Copyright 2011 EMC Corporation. All rights reserved. So what does this mean? •  Assume user devices have been compromised •  Implement best practices to secure data on or accessed by the device •  Enforce strong authentication to verify user’s true identity
  • 10. 10© Copyright 2011 EMC Corporation. All rights reserved. Challenges of Mobile Authentication User Experience a top priority Authentication must be convenient Policies based on risk and sensitivity Device Profile Behavior Profile Known Fraud Risk Analysis Result PASS FAIL VERIFY Ø  Life questions Ø  Passcode via SMS Ø  Biometrics
  • 11. 11© Copyright 2011 EMC Corporation. All rights reserved. voice signature vein finger retina face vein retina face type signature voice face AVAILABLE FOR MOBILE MATURE TECHNOLOGY ENABLES STEP UP type Researched 30+ biometric solutions Validated & Filtered Evaluated methods Biometric Methods For Mobile signature
  • 12. 12© Copyright 2011 EMC Corporation. All rights reserved. Accuracy Usability Integrations
  • 13. 13© Copyright 2011 EMC Corporation. All rights reserved. Unlock Access Across Multiple Channels The Future Is Now