SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
The Secure Authentication Service

Signify helps organisations to secure their computer networks. We provide a secure alternative to passwords
that safely enables remote access to systems and information by delivering two-factor authentication as an
on-demand hosted service.



                                                                      Key benefits of the
                                                                      Signify Service
                                                                      • Guaranteed Reliability

                                                                      • Proven Security

                                                                      • Flexible to your requirements

                                                                      • Quick to deploy



                                                                     Who needs two-factor
                                                                     authentication?
                                                                     Our service is ideal for
Since 2000, Signify has built an outstanding reputation for
                                                                     organisations that have:
delivering secure, reliable and flexible two-factor authentication
which is quick and easy to deploy. We have an extensive client       • Home workers and day extenders
base across many sectors including major multi-national              • Mobile staff
corporations, small and medium sized businesses, professional
services, central government and local authorities.                  • Business partners who
                                                                       collaborate via an extranet or
Signify’s Authentication Service                                       VPN
Signify’s fully hosted authentication service delivers a choice of   • Guest and temporary workers
token and tokenless authentication services, with flexible options
to meet different needs, budgets and working patterns. This          • 24 x 7 IT support staff
makes it easy for our customers to provide the appropriate form
of authentication to suit each group of their users.
Our service enables organisations to rigorously identify staff,
clients, business partners and other individuals who need secure
access to sensitive information, applications and networks. With
our dedicated team focused purely on running this high quality
hosted service we radically lower the total cost of ownership and
simplify the deployment of two-factor authentication.
More than just technology
The successful deployment of two-factor authentication takes more than just technology; you also need to
implement a framework of policies, procedures, logistics and user support. Through our focus on running
hosted authentication services, we have learned, defined, and automated many best-practice policies and
processes into our service. All you need to do is simply choose the options and policies that suit your
organisation’s requirements.
Together with 24 x 7 user support and managed logistics this makes our service very quick and easy to
deploy, and is so simple to use that any end user will find it easy.

                           Your Network




                                                                                                                                             Remote User

                              VPN or web                                                Internet
                              access gateway




                                                                                                       Signify
            How it works



Our easy-to-use web portal allows customers to manage and monitor every aspect of their service.
Signify’s service is ideal for organisations that want to ensure security and reliability, without taking on the
skills, equipment or risk to deploy a solution themselves. By hosting the infrastructure and protecting it from
malicious activity, we can provide a service with guaranteed availability globally 24 x 7.
Where appropriate, multiple organisations can each choose to use Signify as their hosted service provider
and then allow users to have a single “federated” identity that can be shared between organisations. This is
especially useful for collaborative activities such as complex supply chains, outsourced management or large
projects, allowing the independent parties to pay only for what they need.


The Signify service is fully compatible with all leading VPNs, firewalls and web servers including:




Authorised partner:




                                                                                                                      info@signify.net www.signify.net
                                                                                                                                 +44 (0)1223 472572
©2008 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks
of RSA Security Inc. The Blackberry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerWSO2
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - ApresentaçãoAdoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - ApresentaçãoClavis Segurança da Informação
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case StudyFIDO Alliance
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority BrochureVivastream
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingForgeRock
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENThardik soni
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Dictao
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersForgeRock
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
Identity Live Sydney 2017 - Ian Sorbello
Identity Live Sydney 2017 - Ian SorbelloIdentity Live Sydney 2017 - Ian Sorbello
Identity Live Sydney 2017 - Ian SorbelloForgeRock
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
Far South Networks - Wander Web
Far South Networks - Wander WebFar South Networks - Wander Web
Far South Networks - Wander WebClarotech_Events
 

Was ist angesagt? (16)

Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - ApresentaçãoAdoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENT
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Identity Live Sydney 2017 - Ian Sorbello
Identity Live Sydney 2017 - Ian SorbelloIdentity Live Sydney 2017 - Ian Sorbello
Identity Live Sydney 2017 - Ian Sorbello
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Far South Networks - Wander Web
Far South Networks - Wander WebFar South Networks - Wander Web
Far South Networks - Wander Web
 

Ähnlich wie Signify Overview

Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenskate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems Pvt. Ltd
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authenticationMint Group
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify serviceChristine Gupta
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonCloudFenceTechnologi
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 

Ähnlich wie Signify Overview (20)

Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoring
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in Gurgaon
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
AWS Partners
AWS PartnersAWS Partners
AWS Partners
 
Microsoft Office 365
Microsoft Office 365 Microsoft Office 365
Microsoft Office 365
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 

Signify Overview

  • 1. The Secure Authentication Service Signify helps organisations to secure their computer networks. We provide a secure alternative to passwords that safely enables remote access to systems and information by delivering two-factor authentication as an on-demand hosted service. Key benefits of the Signify Service • Guaranteed Reliability • Proven Security • Flexible to your requirements • Quick to deploy Who needs two-factor authentication? Our service is ideal for Since 2000, Signify has built an outstanding reputation for organisations that have: delivering secure, reliable and flexible two-factor authentication which is quick and easy to deploy. We have an extensive client • Home workers and day extenders base across many sectors including major multi-national • Mobile staff corporations, small and medium sized businesses, professional services, central government and local authorities. • Business partners who collaborate via an extranet or Signify’s Authentication Service VPN Signify’s fully hosted authentication service delivers a choice of • Guest and temporary workers token and tokenless authentication services, with flexible options to meet different needs, budgets and working patterns. This • 24 x 7 IT support staff makes it easy for our customers to provide the appropriate form of authentication to suit each group of their users. Our service enables organisations to rigorously identify staff, clients, business partners and other individuals who need secure access to sensitive information, applications and networks. With our dedicated team focused purely on running this high quality hosted service we radically lower the total cost of ownership and simplify the deployment of two-factor authentication.
  • 2. More than just technology The successful deployment of two-factor authentication takes more than just technology; you also need to implement a framework of policies, procedures, logistics and user support. Through our focus on running hosted authentication services, we have learned, defined, and automated many best-practice policies and processes into our service. All you need to do is simply choose the options and policies that suit your organisation’s requirements. Together with 24 x 7 user support and managed logistics this makes our service very quick and easy to deploy, and is so simple to use that any end user will find it easy. Your Network Remote User VPN or web Internet access gateway Signify How it works Our easy-to-use web portal allows customers to manage and monitor every aspect of their service. Signify’s service is ideal for organisations that want to ensure security and reliability, without taking on the skills, equipment or risk to deploy a solution themselves. By hosting the infrastructure and protecting it from malicious activity, we can provide a service with guaranteed availability globally 24 x 7. Where appropriate, multiple organisations can each choose to use Signify as their hosted service provider and then allow users to have a single “federated” identity that can be shared between organisations. This is especially useful for collaborative activities such as complex supply chains, outsourced management or large projects, allowing the independent parties to pay only for what they need. The Signify service is fully compatible with all leading VPNs, firewalls and web servers including: Authorised partner: info@signify.net www.signify.net +44 (0)1223 472572 ©2008 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks of RSA Security Inc. The Blackberry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.