Signify Software Tokens

Software Tokens
Two Factor Authentication for your smartphone
Signify helps organisations to secure their computer networks. We provide a secure alternative to
passwords that safely enables remote access to systems and information by delivering two-factor
authentication as an on-demand, hosted service.



                                                                            Key benefits
                                                                            Guaranteed Reliability:
                                                                             • Works without mobile phone network
                                                                               coverage
                                                                             • Distributed and resilient infrastructure
                                                                             • SLA backed service

                                                                            Proven Security:
                                                                             • Market leading RSA software token
                                                                             • Infrastructure designed and managed
                                                                               with security in mind
Signify Software Tokens deliver market leading RSA two factor
                                                                             • Secure web portal administration
authentication by turning a smartphone (BlackBerry or Windows
Mobile) into a strong authentication token. Our service makes it easy       Flexible to your requirements:
to securely identify users 24 x 7 by confirming they have their
                                                                             • Mix our token and tokenless services
smartphone with them. As a fully hosted service we ensure that the
                                                                             • Utilises your user’s existing smartphone
service works securely and reliably.
                                                                               device
Signify Software Tokens are ideal for users who need secure remote           • Variety of contract lengths
access from any computer, but don’t want to carry a token in addition
to their other mobile devices.                                              Quick to deploy:
                                                                             • Compatible with all leading VPNs,
What are Signify Software Tokens?                                              firewalls and web servers
Signify Software Tokens allow a user’s smartphone to be used just like a
                                                                             • No training required
strong authentication token, which they need to have with them when
                                                                             • No physical token to deploy
they wish to remotely access networks, files and applications. Signify
                                                                             • Efficient software token provisioning
delivers RSA software tokens which work just like RSA’s market leading
                                                                               process
SecurID keyfob tokens. You get RSA security and reliability with the
convenience of using your own smartphone, delivered by Signify’s
proven hosted service.

When a user wishes to access their corporate data remotely using a PC
or laptop, they simply enter their secret PIN into their smartphone
token application. The smartphone then generates a one time passcode
which the user then enters into the password field on their PC or
laptop. By demonstrating that they have these two ‘factors’ – a secret
PIN and their smartphone – the user is securely identified.

Signify Software Tokens provide a better user experience because they
enable users to use their preferred mobile device to authenticate
themselves. Users usually tend to look after their smartphones more
carefully than a keyfob token and are therefore less likely to lose them.
When lost, they are more likely to report that fact, enabling the token
to be disabled, ensuring that your corporate security is maintained.
A Complete Managed Service
The successful deployment of two-factor authentication takes more than just technology; you also need to implement a
framework of policies, procedures, logistics and user support. These are automated through key features of our service:

Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data
centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years.

The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use
web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself.

End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems
such as forgotten PINs. This reduces your costs and improves the end user experience.

Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s
smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining
the set up procedure for each user, to ensure they can start working first time, every time, without adding load to
your already busy IT team.

You may not want a software token for all your users? Signify’s range of services make it easy
for you to give each user the most appropriate form of authentication to match their working pattern and security
privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode
OnDemand services.




   Included Features
   Authentication Device                      Uses the existing smartphone each user already carries
                                              Software token is installed as an additional application

   Authentication Service                     Annual service fee per user
                                              Unlimited authentications per user

   Organisation Base Pack                     IMC web portal for administration
                                              Telephone/e-mail support for administrators from our dedicated support team
                                              End user web helpdesk for automated resolution of end user issues

   Optional Features                          Discounts for multi-year contracts
                                              Software token life to suit how long you keep your smartphones




Authorised partner:




                                                                                                                     info@signify.net www.signify.net
                                                                                                                                +44 (0)1223 472572
©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks
of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.

Recomendados

Rsa Secur Id From Signify von
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
154 views2 Folien
Signify Passcode On Demand von
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
106 views2 Folien
Beam datasheet final 7 28-12 von
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Bitzer Mobile, now part of Oracle
602 views2 Folien
Cidway Banking 02 2011 von
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
368 views21 Folien
PIV Card based Identity Assurance in Sun Ray and IDM environment von
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
1.6K views14 Folien
OmniSource_ppt_2011_7-2 (2)(1) von
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)Andrea Colombetti
69 views19 Folien

Más contenido relacionado

Was ist angesagt?

Samsung KNOX - The Most Secure Android Solution von
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
4.1K views19 Folien
Assurity seminar 24 jan von
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
387 views27 Folien
Cidway Corporate Access 06 2009 Full von
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
427 views18 Folien
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen von
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzenThomas Dehler
394 views23 Folien
KNOX Message: Collaborate Securely, Anywhere, Anytime von
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
3K views14 Folien
Norton Zone File-Sharing Service von
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing ServiceSymantec
9.2K views17 Folien

Was ist angesagt?(16)

Samsung KNOX - The Most Secure Android Solution von Samsung Biz Mobile
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile4.1K views
Assurity seminar 24 jan von Jason Kong
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
Jason Kong387 views
Cidway Corporate Access 06 2009 Full von lfilliat
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
lfilliat427 views
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen von Thomas Dehler
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Thomas Dehler394 views
KNOX Message: Collaborate Securely, Anywhere, Anytime von Samsung Biz Mobile
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
Norton Zone File-Sharing Service von Symantec
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
Symantec9.2K views
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri... von Hitachi ID Systems, Inc.
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Mdc Brochure von martgroot
Mdc BrochureMdc Brochure
Mdc Brochure
martgroot154 views
Java Everywhere. Descubra la Internet de las Cosas von GeneXus
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas
GeneXus414 views
Technet System Center Mobile Device Manager Presentation von jasonlan
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
jasonlan1.2K views
Business Mobility - otevřete svou mysl k tomu, co je možné von MarketingArrowECS_CZ
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné

Similar a Signify Software Tokens

Rsa Secur Id From Signify von
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
144 views2 Folien
Signify Passcode On Demand von
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
229 views2 Folien
Signify Overview von
Signify OverviewSignify Overview
Signify Overviewkate_holden
101 views2 Folien
Signify Overview von
Signify OverviewSignify Overview
Signify Overviewpjpallen
65 views2 Folien
2p Mta Data Sheet V1.7 X1a von
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
182 views2 Folien
Entrust IdentityGuard Mobile von
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
1.3K views4 Folien

Similar a Signify Software Tokens(20)

Rsa Secur Id From Signify von kate_holden
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
kate_holden144 views
Signify Passcode On Demand von kate_holden
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
kate_holden229 views
Signify Overview von pjpallen
Signify OverviewSignify Overview
Signify Overview
pjpallen65 views
2p Mta Data Sheet V1.7 X1a von alwayson
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
alwayson182 views
2FA Advanced Authentication for Public Safety von 2FA, Inc.
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.355 views
How to successfully implement a secure mobile strategy von VASCO Data Security
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
VASCO Data Security1.2K views
Beyond username and password it's continuous authorization webinar von ForgeRock
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
ForgeRock826 views
Virtual Merchant Mobile Swipe Solution von greatdaniel
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
greatdaniel926 views
Entrust datacard --Authentication solutions overview von Abhishek Sood
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood94 views
10695 sidtfa sb_0210 von Hai Nguyen
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
Hai Nguyen404 views
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro... von SafeNet
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeNet536 views
SmartCard Forum 2011 - Evolution of authentication market von OKsystem
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem880 views
Ultima - Mobile Data Security von trickey270
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
trickey270105 views

Último

SAP Automation Using Bar Code and FIORI.pdf von
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 Folien
PharoJS - Zürich Smalltalk Group Meetup November 2023 von
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
120 views17 Folien
Attacking IoT Devices from a Web Perspective - Linux Day von
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 Folien
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
15 views15 Folien
Throughput von
ThroughputThroughput
ThroughputMoisés Armani Ramírez
36 views11 Folien
Data-centric AI and the convergence of data and model engineering: opportunit... von
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...Paolo Missier
34 views40 Folien

Último(20)

PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 views
Attacking IoT Devices from a Web Perspective - Linux Day von Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
Data-centric AI and the convergence of data and model engineering: opportunit... von Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views
DALI Basics Course 2023 von Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
Web Dev - 1 PPT.pdf von gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 views
The Importance of Cybersecurity for Digital Transformation von NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views
Perth MeetUp November 2023 von Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 views
Combining Orchestration and Choreography for a Clean Architecture von ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 views
Black and White Modern Science Presentation.pptx von maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... von NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 views

Signify Software Tokens

  • 1. Software Tokens Two Factor Authentication for your smartphone Signify helps organisations to secure their computer networks. We provide a secure alternative to passwords that safely enables remote access to systems and information by delivering two-factor authentication as an on-demand, hosted service. Key benefits Guaranteed Reliability: • Works without mobile phone network coverage • Distributed and resilient infrastructure • SLA backed service Proven Security: • Market leading RSA software token • Infrastructure designed and managed with security in mind Signify Software Tokens deliver market leading RSA two factor • Secure web portal administration authentication by turning a smartphone (BlackBerry or Windows Mobile) into a strong authentication token. Our service makes it easy Flexible to your requirements: to securely identify users 24 x 7 by confirming they have their • Mix our token and tokenless services smartphone with them. As a fully hosted service we ensure that the • Utilises your user’s existing smartphone service works securely and reliably. device Signify Software Tokens are ideal for users who need secure remote • Variety of contract lengths access from any computer, but don’t want to carry a token in addition to their other mobile devices. Quick to deploy: • Compatible with all leading VPNs, What are Signify Software Tokens? firewalls and web servers Signify Software Tokens allow a user’s smartphone to be used just like a • No training required strong authentication token, which they need to have with them when • No physical token to deploy they wish to remotely access networks, files and applications. Signify • Efficient software token provisioning delivers RSA software tokens which work just like RSA’s market leading process SecurID keyfob tokens. You get RSA security and reliability with the convenience of using your own smartphone, delivered by Signify’s proven hosted service. When a user wishes to access their corporate data remotely using a PC or laptop, they simply enter their secret PIN into their smartphone token application. The smartphone then generates a one time passcode which the user then enters into the password field on their PC or laptop. By demonstrating that they have these two ‘factors’ – a secret PIN and their smartphone – the user is securely identified. Signify Software Tokens provide a better user experience because they enable users to use their preferred mobile device to authenticate themselves. Users usually tend to look after their smartphones more carefully than a keyfob token and are therefore less likely to lose them. When lost, they are more likely to report that fact, enabling the token to be disabled, ensuring that your corporate security is maintained.
  • 2. A Complete Managed Service The successful deployment of two-factor authentication takes more than just technology; you also need to implement a framework of policies, procedures, logistics and user support. These are automated through key features of our service: Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years. The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself. End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems such as forgotten PINs. This reduces your costs and improves the end user experience. Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining the set up procedure for each user, to ensure they can start working first time, every time, without adding load to your already busy IT team. You may not want a software token for all your users? Signify’s range of services make it easy for you to give each user the most appropriate form of authentication to match their working pattern and security privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode OnDemand services. Included Features Authentication Device Uses the existing smartphone each user already carries Software token is installed as an additional application Authentication Service Annual service fee per user Unlimited authentications per user Organisation Base Pack IMC web portal for administration Telephone/e-mail support for administrators from our dedicated support team End user web helpdesk for automated resolution of end user issues Optional Features Discounts for multi-year contracts Software token life to suit how long you keep your smartphones Authorised partner: info@signify.net www.signify.net +44 (0)1223 472572 ©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.