SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Conveniently Solving
                                 the Secure Identity
                                        Challenges




                                                Marcel Kuiken
                                          Area Sales Manager
© 2012 - VASCO Data Security
                                 Enterprise Security Nederland
Imagine
                                   Peace




© 2012 - VASCO Data Security
in Reality
                                     but

                                   it is war




© 2012 - VASCO Data Security
a Digital
                                    war




© 2012 - VASCO Data Security
Trojan
                                with

                                       horses




© 2012 - VASCO Data Security
Pirates
                                   with




© 2012 - VASCO Data Security
Phishers
                                    with




© 2012 - VASCO Data Security
Viruses
                                   with




© 2012 - VASCO Data Security
Spam
                                 with




© 2012 - VASCO Data Security
Intrusions
                                with




© 2012 - VASCO Data Security
breaches




© 2012 - VASCO Data Security   Conveniently Solving the Secure Identity Challenges
                                                                              11
Please log in to get started




                                   JohnDoe

                                   ********
                                                    x8per day




© 2012 - VASCO Data Security                  Lunch & Learn Infosecurity 2012   12
Digital Identity




                               x7
                               apps




© 2012 - VASCO Data Security           Lunch & Learn Infosecurity 2012   13
Digital Identity Expanded




                               25
                               accounts




© 2012 - VASCO Data Security               Lunch & Learn Infosecurity 2012   14
The Internet of Things
    World
 Population            6.3 Billion         6.8 Billion         7.2 Billion              7.6 Billion
 Connected             500 Million         12.5 Billion        25 Billion               50 Billion
   Devices




                                                    x4
                                                     devices




Connected
                                   More devices
   Devices                  0.08                  1.84             3.47                       6.85
                                   than people
Per Person
                           2003                   2010             2015                      2020
© 2012 - VASCO Data Security                                                 Lunch & Learn Infosecurity 2012   15
Source: Cisco IBSG, April 2011
Convergence




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   16
Multi-Device and Digital Identity




© 2012 - VASCO Data Security                      Lunch & Learn Infosecurity 2012   17
How many passwords do you have?

                                                                   PASSWORD
                                                                            2%




                                                                          26%



                                                                          23%

                                        6
                                      passwords
                                                                          18%



                                                                          15%



                                                                          16%


© 2012 - VASCO Data Security                      Lunch & Learn Infosecurity 2012   18
Which password for which site?

                                                                PASSWORD
                                                                         2%




                                                                       26%



                                                                       23%



                                                                       18%



                                                                       15%



                                                                       16%


© 2012 - VASCO Data Security                   Lunch & Learn Infosecurity 2012   19
Convenient but not Secure

                                               V       V   V
                                           V                   V
                                   V
                                                                       V
                               V
                                                                           V
                       V
                                               V                               V
                     V

                     V                 V                       V
                                                                               V
                                                                                            1
                                                                                         Password
                                                                               V
                         V
                                                                             V
                             V                     V
                                                                       V
                                   V                               V
                                           V               V
                                               V       V
© 2012 - VASCO Data Security                                           Lunch & Learn Infosecurity 2012   20
Bill Gates

 “People use the same password on different systems,
 they write them down and they just don’t meet the
 challenge for anything you really want to secure”




© 2012 - VASCO Data Security
Video




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   22
DIGIPASS




© 2012 - VASCO Data Security
Core Activities




© 2012 - VASCO Data Security   Conveniently Solving the Secure Identity Challenges   24
VASCO Philosophy & Perspective



                                           Security




                                    Ease                  Cost




© 2012 - VASCO Data Security                   Conveniently Solving the Secure Identity Challenges   25
References in Financial Institutions




© 2012 - VASCO Data Security                   Lunch & Learn Infosecurity 2012   26
References in Enterprise Market




© 2012 - VASCO Data Security                     Lunch & Learn Infosecurity 2012   27
Sold & Deployed DIGIPASS world wide


      DIGIPASS             DIGIPASS
        GO 3                 GO 6                 DIGIPASS          DIGIPASS          DIGIPASS     DIGIPASS     DIGIPASS    DIGIPASS     DIGIPASS
                                                   CertiID           Key 101          250 -251     260 -261       270       270 XPress     275




     DIGIPASS              DIGIPASS
       GO 7                 GO 100                DIGIPASS          DIGIPASS
                                                   Key 200           Key 860
                                                                                             DIGIPASS       DIGIPASS   DIGIPASS     DIGIPASS
                                                                                              301 CV          550        560          736




 Virtual        DIGIPASS       DIGIPASS     DIGIPASS    DIGIPASS      DIGIPASS    DIGIPASS       DIGIPASS        DIGIPASS     DIGIPASS     DIGIPASS
DIGIPASS          Nano         for Mobile     805         800           810         815            820             830          831          835A




     DIGIPASS         DIGIPASS              DIGIPASS     DIGIPASS      DIGIPASS   DIGIPASS       DIGIPASS        DIGIPASS     DIGIPASS         DIGIPASS
    for Windows        for Web                836          837           840A      840 CV          855             865          905              920

   © 2012 - VASCO Data Security                                                                       Lunch & Learn Infosecurity 2012              28
DIGIPASS Omnipresent




                                        IPT
                    dP+




                  DESS                  DESS
© 2012 - VASCO Data Security
Can Digipass authentication be an
    enabler for online applications ?




© 2012 - VASCO Data Security
Application Owners vs Users
Application concerns:                 User concerns:

-   Community                         -   Ease of Use
-   Conversion                        -   From my lazy chair
-   Traffic                           -   On my iPad
-   Cost                              -   On my new Smart TV
-   End-User Stickyness               -   Via my iPhone please
-   Margin                            -   Secure
-   Turnover                          -   Free
-   Profit                            -   Mobility
-   Fraude                            -   Privacy
-   SW@N                              -   Identity
-   Reputation                        -   Value
-   Ranking                           -   Cool Design
-   Competition                       -   Just 1 login to all my apps
-   Deployment                        -   Not any more passwords please
-   Churn                             -   No new account opening
-   ……….                              -   …..


© 2012 - VASCO Data Security                       Lunch & Learn Infosecurity 2012   31
Secure Login Webshop




© 2012 - VASCO Data Security           Lunch & Learn Infosecurity 2012   32
© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   33
Multiplatform




© 2012 - VASCO Data Security       MYDIGIPASS.COM   34
Apple Demo




© 2012 - VASCO Data Security
Application Owners vs Users
Application concerns:                 User concerns:

-   Community                         -   Ease of Use
-   Conversion                        -   From my lazy chair
-   Traffic                           -   On my iPad in the bathroom
-   Cost                              -   On my new Smart TV
-   End-User Stickyness               -   Via my iPhone please
-   Margin                            -   Secure
-   Turnover                          -   Free
-   Profit                            -   Mobility
-   Fraude                            -   Privacy
-   SW@N                              -   Identity
-   Reputation                        -   Value
-   Ranking                           -   Cool Design
-   Competition                       -   Just 1 login to all my apps
-   Deployment                        -   Not any more passwords please
-   Churn                             -   No new account opening
-   ……….                              -   …..


© 2012 - VASCO Data Security                       Lunch & Learn Infosecurity 2012   36
Signup today




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   37
Let’s make business together




© 2012 - VASCO Data Security                  Lunch & Learn Infosecurity 2012   38
Thank You




                           Marcel Kuiken
                           Area Sales Manager
                           Enterprise Security Nederland

                           marcel.kuiken@vasco.com

                           GSM: 06-13593579
© 2012 - VASCO Data Security
Copyright & Trademarks

 Copyright
    2012 VASCO Data Security. All rights reserved.
 No part of this publication may be reproduced, stored in a retrieval system, or
 transmitted, in any form or by any
 means, electronic, mechanical, photocopying, recording, or otherwise, without
 the prior written permission of VASCO Data Security.

 Trademarks
 VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® and the                ® logo

 are registered or unregistered trademarks of VASCO Data Security, Inc. and/or
 VASCO Data Security International GmbH in the U.S. and other countries

 Disclaimer of Warranties and Limitations of Liabilities
 This Report is provided on an 'as is' basis, without any other warranties,
 or conditions.



© 2012 - VASCO Data Security                               Lunch & Learn Infosecurity 2012   40

Weitere ähnliche Inhalte

Ähnlich wie DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient OTP authentication from any device - Single sign-on across applicationsThis balances application needs for security and growth with user priorities of ease and mobility. DIGIPASS authentication can enable new online experiences while respecting both perspectives

DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldAndris Soroka
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa Data
 
Accel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNECIndia
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groepDerk Yntema
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at CiscoCisco Canada
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
WBSN Q412 Investor Presentation
WBSN Q412 Investor PresentationWBSN Q412 Investor Presentation
WBSN Q412 Investor Presentationavelinakauffman
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaInternet World
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Riverbed Technology
 
Deploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesDeploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesCisco Canada
 

Ähnlich wie DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient OTP authentication from any device - Single sign-on across applicationsThis balances application needs for security and growth with user priorities of ease and mobility. DIGIPASS authentication can enable new online experiences while respecting both perspectives (20)

DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The World
 
MYDIGIPASS.COM
MYDIGIPASS.COMMYDIGIPASS.COM
MYDIGIPASS.COM
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013
 
Accel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel klantenevent 2016: Vasco
Accel klantenevent 2016: Vasco
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security Solutions
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groep
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at Cisco
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
WBSN Q412 Investor Presentation
WBSN Q412 Investor PresentationWBSN Q412 Investor Presentation
WBSN Q412 Investor Presentation
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10
 
Deploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesDeploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI Services
 

Mehr von VASCO Data Security (11)

Increasing your mobile banking business
Increasing your mobile banking businessIncreasing your mobile banking business
Increasing your mobile banking business
 
MYDIGIPASS.COM leaflet
MYDIGIPASS.COM leafletMYDIGIPASS.COM leaflet
MYDIGIPASS.COM leaflet
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Identikey
IdentikeyIdentikey
Identikey
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
aXsGuard Gatekeeper
aXsGuard GatekeeperaXsGuard Gatekeeper
aXsGuard Gatekeeper
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Password fatigation
Password fatigationPassword fatigation
Password fatigation
 
Infosec31october
Infosec31octoberInfosec31october
Infosec31october
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient OTP authentication from any device - Single sign-on across applicationsThis balances application needs for security and growth with user priorities of ease and mobility. DIGIPASS authentication can enable new online experiences while respecting both perspectives

  • 1. Conveniently Solving the Secure Identity Challenges Marcel Kuiken Area Sales Manager © 2012 - VASCO Data Security Enterprise Security Nederland
  • 2. Imagine Peace © 2012 - VASCO Data Security
  • 3. in Reality but it is war © 2012 - VASCO Data Security
  • 4. a Digital war © 2012 - VASCO Data Security
  • 5. Trojan with horses © 2012 - VASCO Data Security
  • 6. Pirates with © 2012 - VASCO Data Security
  • 7. Phishers with © 2012 - VASCO Data Security
  • 8. Viruses with © 2012 - VASCO Data Security
  • 9. Spam with © 2012 - VASCO Data Security
  • 10. Intrusions with © 2012 - VASCO Data Security
  • 11. breaches © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 11
  • 12. Please log in to get started JohnDoe ******** x8per day © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 12
  • 13. Digital Identity x7 apps © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 13
  • 14. Digital Identity Expanded 25 accounts © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 14
  • 15. The Internet of Things World Population 6.3 Billion 6.8 Billion 7.2 Billion 7.6 Billion Connected 500 Million 12.5 Billion 25 Billion 50 Billion Devices x4 devices Connected More devices Devices 0.08 1.84 3.47 6.85 than people Per Person 2003 2010 2015 2020 © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 15 Source: Cisco IBSG, April 2011
  • 16. Convergence © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 16
  • 17. Multi-Device and Digital Identity © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 17
  • 18. How many passwords do you have? PASSWORD 2% 26% 23% 6 passwords 18% 15% 16% © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 18
  • 19. Which password for which site? PASSWORD 2% 26% 23% 18% 15% 16% © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 19
  • 20. Convenient but not Secure V V V V V V V V V V V V V V V V V 1 Password V V V V V V V V V V V V © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 20
  • 21. Bill Gates “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure” © 2012 - VASCO Data Security
  • 22. Video © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 22
  • 23. DIGIPASS © 2012 - VASCO Data Security
  • 24. Core Activities © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 24
  • 25. VASCO Philosophy & Perspective Security Ease Cost © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 25
  • 26. References in Financial Institutions © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 26
  • 27. References in Enterprise Market © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 27
  • 28. Sold & Deployed DIGIPASS world wide DIGIPASS DIGIPASS GO 3 GO 6 DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS CertiID Key 101 250 -251 260 -261 270 270 XPress 275 DIGIPASS DIGIPASS GO 7 GO 100 DIGIPASS DIGIPASS Key 200 Key 860 DIGIPASS DIGIPASS DIGIPASS DIGIPASS 301 CV 550 560 736 Virtual DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS Nano for Mobile 805 800 810 815 820 830 831 835A DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS for Windows for Web 836 837 840A 840 CV 855 865 905 920 © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 28
  • 29. DIGIPASS Omnipresent IPT dP+ DESS DESS © 2012 - VASCO Data Security
  • 30. Can Digipass authentication be an enabler for online applications ? © 2012 - VASCO Data Security
  • 31. Application Owners vs Users Application concerns: User concerns: - Community - Ease of Use - Conversion - From my lazy chair - Traffic - On my iPad - Cost - On my new Smart TV - End-User Stickyness - Via my iPhone please - Margin - Secure - Turnover - Free - Profit - Mobility - Fraude - Privacy - SW@N - Identity - Reputation - Value - Ranking - Cool Design - Competition - Just 1 login to all my apps - Deployment - Not any more passwords please - Churn - No new account opening - ………. - ….. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 31
  • 32. Secure Login Webshop © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 32
  • 33. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 33
  • 34. Multiplatform © 2012 - VASCO Data Security MYDIGIPASS.COM 34
  • 35. Apple Demo © 2012 - VASCO Data Security
  • 36. Application Owners vs Users Application concerns: User concerns: - Community - Ease of Use - Conversion - From my lazy chair - Traffic - On my iPad in the bathroom - Cost - On my new Smart TV - End-User Stickyness - Via my iPhone please - Margin - Secure - Turnover - Free - Profit - Mobility - Fraude - Privacy - SW@N - Identity - Reputation - Value - Ranking - Cool Design - Competition - Just 1 login to all my apps - Deployment - Not any more passwords please - Churn - No new account opening - ………. - ….. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 36
  • 37. Signup today © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 37
  • 38. Let’s make business together © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 38
  • 39. Thank You Marcel Kuiken Area Sales Manager Enterprise Security Nederland marcel.kuiken@vasco.com GSM: 06-13593579 © 2012 - VASCO Data Security
  • 40. Copyright & Trademarks Copyright 2012 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries Disclaimer of Warranties and Limitations of Liabilities This Report is provided on an 'as is' basis, without any other warranties, or conditions. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 40

Hinweis der Redaktion

  1. CHAT: How many times a day do you login on a website?Today somelarge websites have their customers' passwords floating around on the Internet.
  2. CHAT: How many differentwebsites with a login screen do you visit in a week?Every day you encounter log-in screens, that protect your most valuable work. Requiring you to type in a password, and this around 8 times per day.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  3. CHAT: On how many sites have you created an account with a username and password?72% of the users have more than 5 online accounts.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  4. CHAT: How many different devices do you use to access the Internet and what are they?Log-in screens that that give you access to a big load of different web applications. With an average of 25 web applications per user.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  5. Enabling you access with your laptop, desktop, smart phone, and tablet.
  6. Today these worlds collide.
  7. CHAT: How many different passwords do you have to protect these accounts.Users having multiple devices to access multiple services.
  8. All secured by a multitude of passwords. Having an average of 6 passwords: based upon pet names, family names, birthdays, nicknames, the word “PASSWORD” and in some cases a random password.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  9. CHAT: How do you remember those passwords?This would mean that each password is shared across 4 different sites. So the inconvenience does not become remembering the passwords, but rather which password was used for which site.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf“Office workers give away passwords for a cheap pen”Infosecurity Europe 2003http://www.theregister.co.uk/content/55/30324.html
  10. So to keep it convenient  you revert back to 1 password, write it down, store it onto your desktop, laptop, tablet and mobile phone, creating a security risk for your valuable work. Because there is only one password to rule all the applications. And that one password will be stored by all the different Web Applications, and as many as 30%are thought to store that passwords in the clear.“You might care about security online but do you understand it? ”http://scott-allison.net/2011/08/19/you-might-care-about-security-online-but-do-you-understand-it/“RockYou Hacker: 30% of Sites Store Plain Text Passwords”http://www.readwriteweb.com/archives/rockyou_hacker_30_of_sites_store_plain_text_passwords.php
  11. A famous man once said that “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure”Bill Gates (2004 RSA Security Conference)
  12. But why make this your concern as a Web Application Provider? Simply because you are losing money. By Fraud, inconvenience and Total Cost Of Ownership.
  13. Raise Hand: Who knows what a DIGIPASS is?That is why more than 25 years ago we at VASCO created the DIGIPASS. This is a onetime password generator that can be used as a 2 Factor authentication solution. Making any log-in a secure log-in. As the generated password can only be used once during a limited amount of time.
  14. CHAT: Can you give an example where you use user authentication.CHAT: Can you give an example where you use electronic signature.CHAT: Can you give an example where you use digital signature.We deliver software and hardware solutions with regard to user authentication, electronic signature, and digital signature.
  15. Offering the best solution for every customer is finding the balance between price, user convenience and security
  16. Raise Hand: Is your bank using 2FA?More than 1,700 financial institutions/Banks all over the world gave us the necessary confidence.
  17. Over 8,000 enterprise customers are in our reference list.
  18. Annotation: Highlight the DIGIPASS you are using today, if none mark the white area.VASCO sold & deployed and delivered more than 100,000,000 DIGIPASS devices, with a wide range in shape, size, color, and functionality.
  19. The DIGIPASS Embedded Solution Strategy will enable 1.000.000.000 dormant DIGIPASS authenticators in 2014. By embedding our technology into other products, any user will have access to a DIGIPASS.
  20. Raise Hand: Who knows what a DIGIPASS is?That is why more than 25 years ago we at VASCO created the DIGIPASS. This is a onetime password generator that can be used as a 2 Factor authentication solution. Making any log-in a secure log-in. As the generated password can only be used once during a limited amount of time.
  21. No matter whetheryouuse MYDIGIPASS.COM on a PC, Smartphone or tablet, the applicationautomaticallyresizesto fit your device.
  22. Berghs Kurt our Product Manager and Rousseau Philippe our sales specialist will join us to answer your remaining questions.