SlideShare a Scribd company logo
1 of 42
1 © Copyright 2010 UNIKEN Inc. All rights reserved
Innovation Center
ProductBy
The Core Problem
What’s exactly wrong with the
internet?
2© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
So what’s wrong with it!! Nothing!!!
• It’s cheap
• Anyone can use it (no permissions required for accessing it!)
• It’s available and pervasive (almost everywhere now)
• Anyone can create any website, put any content, on a server, with an IP
address with absolutely NO GOVERNMENT CONTROL!
• Its freedom and democracy at its best!
w w w. u n i k e n . c o m
3© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet Classification
www.uniken.com
Resources that
REQUIRE
Access Control
[Online Banking]
[www.bankofamerica.com]
Resources that DO
NOT require Access
Control
[News]
[www.cnn.com]
Users who want
privacy and identity
protection
Users who DO NOT
want privacy and
identity protection
Needs
Secure
Private
Communication
Does not need
Secure
Private
Communication
4© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
5© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE CORE PROBLEM
THE CURRENT INTERNET INFRASTRUCTURE CANNOT
GUARANTEE THAT THE USER IS CONNECTING TO THE
DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING
TO AN AUTHENTIC PRIVELEGED USER
IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE
ON IDENTITY OF PARTIES INVOLVED IN THE
COMMUNICATION!!!
6© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Internet Evolution – A simplified view
[ARPANET]
TCP/IP
DNSRouters
TLS/SSL
BrowsersHTML
UDP
Web2.0
IPSEC
DNSSEC
Evolution
Digital
Certificates Tokens (OTP)
Site-Key
7© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Customer PC
hosts
INTERNET
ISP DNS
Server
ISP
INTERNET
Certificate
Authority
Fraudster’s
MachineFraudster’s
Machine
Fraudster’s
Machine
Man-in-the-middle
Session Hijacking
Replay Attacks
Phishing
Pharming
Bank
Datacenter
Domain
Registrar
Registrar /
Other
DNS Server
Man-in-the-browser
Man-on-the-machine
Modem
The Result!
8© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet is being used for something that it was NOT
designed for in the first place (Online Banking, Online Share
trading, Enterprise Web-Applications, Mobile Internet
Banking! )
Its’ designers never claimed the Internet (i.e. the packet
switched network – TCP/IP/UDP) was meant for secure private
communications!!
9© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current application services delivery
model is inherently vulnerable from a security
standpoint [Download Browser (from any
source) -> Type URL -> Give Password -> Hope
for the best!]
10© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
URL (domain name) (and corresponding DNS
infrastructure) CANNOT be used as identity
elements (identity look-up stores)(!)
11© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SSL/Digital Certificate based Identity/Trust
Model is broken and has failed to deliver on
its original promise (of providing identity to
enterprises) – since it is based on a flawed
trust model
12© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Available end-user identity technologies are
not geared up to tackle the current attack
vectors (OTP 2FA /Biometric became obsolete
with the advent of MITM kind of attack
vectors)
13© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current Mutual Authentication based
protocols like IPSEC and the corresponding
applications IPSEC/VPN are not scalable (e.g.
Bank and Customers - Million end-points??)
14© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
End-Point Computing Environment is the new
threat frontier - What can AV do if the
processor cannot differentiate between an
authorized and unauthorized machine code(!)
15© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
WHAT IS A PRIVATE
(INTERNET)
APPLICATION
ECOSYSTEM?
16© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SIMPLIFY AND
SECURE
APPLICATION
ECOSYSTEM
CREATE A TECHNOLOGY ENABLED
SECURE SERVICE DELIVERY
PLATFORM TO ENABLE FASTER TIME
TO MARKET AND INCREASED COST
EFFICIENCIES
Device Channel Applications
EnterpriseEnd-User
On Premise
On Cloud
Desktop/Laptop
Smart Phone
Tablet
Internet/Intranet
Employees
Customers
Partners
ECOSYSTEM CONTEXT
17© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PUBLIC (mobile) APP ECOSYSTEMS
Apple (iOS)
Blackberry
They are consumer centric and focus ONLY on
mobile devices and mobile Apps
While Apple and Blackberry ecosystems are
closed (controlled store and proprietary
devices) the rest are open
Enterprises obviously cant use these consumer
centric, platform dependent ecosystems for
distribution, access, control and security for
enterprise applications
[App Store +
(Proprietary) Devices]
Google (Android)
Windows
[App Store + OS]
18© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet Circuits
18
Bank
Users
Bank
Users Bank
Users
Users
merchant
Users
eMail
Users
Social Networking
Users
merchant
Online Bank and its customers
Online Merchant and its customers
Online Collaboration tools (email, chat etc) and its
users
Social Networking Websites and its users
Online News Websites and its readers
Enterprises, their employees, their customers
and vendors
Online Government Services and its citizens
19© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Features of a Private Internet Circuit
• Safety
– Before any communication begins between entities in a PIC, their respective identities are verified by
both entities
– All communication is confidential and tamper proof (encrypted)
• Privileged and Exclusive
– An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC
access system on his/her device will not be able to access the Online Service in the PIC
• Moderated and Controlled
– A central PIC server will control and enable the online services available to all the users of the PIC
ecosystem
– The PIC Server will provision and broker identity relationships in real-time
• Open and Extensible
– Developers can create PIC compatible Online Services and register it with the Central PIC server for
distribution to the users of the PIC ecosystem
19
20© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet (and Application) Ecosystem
Application Store
[Manage, Distribute]
User
Device Manager
[Manage, Control]
User Device Protection
Technology
Authentication
Infrastructure
Channel Security
Infrastructure
[Internet/Intranet]
Secure Application
Viewer
[Application Renderer]
Data Security
Technology
[Control, Protect]
Access Management
Technology
[Closed, Private]
PUBLIC INTERNET SERVICES (B2C)
ENTERPRISE APPLICATION SERVICES (B2B or B2E)
End-Point Container
Technology
[Security, Control]
21© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PRIVATE [CLOSED] INTERNET
ECOSYSTEM
Private
Internet
Ecosystem
Identity
Device
Security
Data
Security
Channel
Security
Access
Management
Device
Management
App
Management
Identity Protection
Personal Online Identity is secured and protected
Closed and Private
Should not be accessible/visible from outside of the ecosystem
Platform, Device and Application Type Independent
Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets,
Web-Apps and Mobile Apps
Device, Application and Data Security
Application and Device Management
22© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
END-USER
REQUIREMENTS
23© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect my login credentials of various critical websites (e.g. Online
Banking, Share Trading)
Protect from MITM/PHISHING and other sophisticated attacks
Protect my credit card/debit card information while doing ecommerce
transactions
Manage and Secure my personal Mobile Devices (e.g. Smart Phones,
Tablets and Latops)
Protect my personal data (e.g. contacts, files)
24© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Sophisticated
Attacks
MITM/PHISHING/PHARMING
Sensitive Data
Personal Contacts, Financial data
Secure
Communication
Chat/File Transfer
eMoney Safety
Credit Card/Debit Card
Ecommerce Transaction Safety
25© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
CIO CHALLENGES
26© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect Enterprise Data from leaking out
Quickly deploy and rapidly roll-out new enterprise application services
Manage and Secure Mobile Devices
Manage Enterprise Web-Apps and Mobile Apps
Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees
Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks
Protect Online and Offline Content
Provide Authentication to End-Users [2FA and 3FA]
Provide remote support to enterprise devices
Reduce the total cost of application infrastructure
And many more such critical security and application management requirements..
27© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Multiple User Types
Customers, Partners, Executive
Management, Employees
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Complex Enterprise
Application Landscape
On-Premise Web-Apps, Mobile Apps,
Hosted/Cloud Based Apps
Multiple Network
Types
Intranet and Internet
Shorter Cycles
Quick Development and Launch,
increasing business speed and
decreasing budgets!
28© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE REL-ID WIDGET
 Simple Client Side Software
that you download from
The REL-ID GATE on your
desktop/Laptop/Mobile
Phones/Tablets
 Configure your web-sites
on the REL-ID widget and
enter your private secure
internet world!
 The REL-ID Widget connects
to your configured web-
sites through the REL-ID
GATE (a cloud or on-
premise based Private
Internet Infrastructure)
Gate MyData
Connect MyCard
Settings Exit
29© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(LAPTOPS/DESKTOPS)
30© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
31© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
32© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Enter previously set Device
Pin
33© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
34© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
IB User Id will get
prepopulated
35© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(MOBILE PHONES AND TABLETS)
36© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
37© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
38© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
39© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
Secure Client
App
Containers
Web-Apps are visible and
accessible only if they are
provisioned in REL-ID
GATETM
Desktop/Laptop REL-ID Widget
REL-ID Web App Viewer
(Micro-Web-Apps)
REL-ID Mobile APP Container
REL-ID Widget
securely connects to the
Web-Apps via R-PCC
REL-ID Web App-Viewer
40© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
GATE
REL-ID
GATE
App Management
Identity Management
Device Management
Authentication
(2FA/3FA)
Access Management
R-PCC* Over Intranet R-PCC* Over Internet
Secure
Channel
Enterprise Web-Apps
[Virtual Image]
Enterprise Mobile Apps
3rd Party Web-Apps
[Virtual Image]
3rd Party
Mobile Apps
Command Center
Secure
Channel
Employee
Partner
Customer
REL-ID Widget
(Secure Client
App Container)
Mobile Phones,
Tablets,
Desktops and
Laptops
*R-PCC:
REL-ID Private Communication Channel (Encrypted)
THE REL-ID ECOTM
Internet
Private
Data
Center
41© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
REL-ID Private Communication Channel (R-PCC)
Mutually Authenticated Communication Handshake (MITM
Proof)
Encrypted Communication (optional), High-Speed and
Concurrent
Horizontally Scalable (Millions of End-Points)
Assets behind R-PCC are not visible to the Internet
and hence protected from various attacks
Requires zero admin privileges on end-user devices
Is created ON-DEMAND
Is agnostic to the underlying NETWORK (Internet or
Intranet)
RPCC Agent can be embedded in any third party application
stack (both software and firmware)
Application Application
REL-ID PCC
Agent
R-PCC (REL-ID Mutually Authenticated
and Encrypted Channel)
Internet or Intranet
42© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
End-User Device
Laptop
Mobile Phone
Tablet
Desktop
REL-ID Secure Container
(Safe Zone)
REL-ID Secure (encrypted)
Data Zone
3rd Party
Browser
REL-ID Web-App
Viewer
Enterprise Apps
Desktop/Laptop/Mobile
REL-ID
Multi-Factor
Authentication
2FA/3FA
R-PCC Agent
R-PCC
REL-ID Secure Container Technology (R-SCT)
REL-ID Device Fingerprinting and
Binding
REL-ID
Device
Management
And Control
Module

More Related Content

Similar to What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward] | Turing100@Persistent

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomJohn Blossom
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mailsAuthShield Labs
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 

Similar to What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward] | Turing100@Persistent (20)

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 

More from Persistent Systems Ltd.

Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...Persistent Systems Ltd.
 
Embedded Linux Evolution | Turing Techtalk
Embedded Linux Evolution | Turing TechtalkEmbedded Linux Evolution | Turing Techtalk
Embedded Linux Evolution | Turing TechtalkPersistent Systems Ltd.
 
Life and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Life and Work of Ken Thompson and Dennis Ritchie | Turing TechtalkLife and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Life and Work of Ken Thompson and Dennis Ritchie | Turing TechtalkPersistent Systems Ltd.
 
Life and Work of Ivan Sutherland | Turing100@Persistent
Life and Work of Ivan Sutherland | Turing100@PersistentLife and Work of Ivan Sutherland | Turing100@Persistent
Life and Work of Ivan Sutherland | Turing100@PersistentPersistent Systems Ltd.
 
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...Persistent Systems Ltd.
 
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Persistent Systems Ltd.
 
Life and Work of Judea Perl | Turing100@Persistent
Life and Work of Judea Perl | Turing100@PersistentLife and Work of Judea Perl | Turing100@Persistent
Life and Work of Judea Perl | Turing100@PersistentPersistent Systems Ltd.
 
Early History of Fortran: The Making of a Wonder | Turing100@Persistent
Early History of Fortran: The Making of a Wonder | Turing100@PersistentEarly History of Fortran: The Making of a Wonder | Turing100@Persistent
Early History of Fortran: The Making of a Wonder | Turing100@PersistentPersistent Systems Ltd.
 
Life and Work of Dr. John Backus | Turing100@Persistent
Life and Work of Dr. John Backus | Turing100@PersistentLife and Work of Dr. John Backus | Turing100@Persistent
Life and Work of Dr. John Backus | Turing100@PersistentPersistent Systems Ltd.
 
Life and Work of Jim Gray | Turing100@Persistent
Life and Work of Jim Gray | Turing100@PersistentLife and Work of Jim Gray | Turing100@Persistent
Life and Work of Jim Gray | Turing100@PersistentPersistent Systems Ltd.
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentPersistent Systems Ltd.
 
Systems Design Experiences or Just Some War Stories…
Systems Design Experiences or Just Some War Stories…Systems Design Experiences or Just Some War Stories…
Systems Design Experiences or Just Some War Stories…Persistent Systems Ltd.
 
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@PersistentLife & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@PersistentPersistent Systems Ltd.
 
Net Neutrality | Turing100@Persistent Systems
Net Neutrality | Turing100@Persistent SystemsNet Neutrality | Turing100@Persistent Systems
Net Neutrality | Turing100@Persistent SystemsPersistent Systems Ltd.
 
Alan Turing Scientist Unlimited | Turing100@Persistent Systems
Alan Turing Scientist Unlimited | Turing100@Persistent SystemsAlan Turing Scientist Unlimited | Turing100@Persistent Systems
Alan Turing Scientist Unlimited | Turing100@Persistent SystemsPersistent Systems Ltd.
 
Life and work of E.F. (Ted) Codd | Turing100@Persistent
Life and work of E.F. (Ted) Codd | Turing100@PersistentLife and work of E.F. (Ted) Codd | Turing100@Persistent
Life and work of E.F. (Ted) Codd | Turing100@PersistentPersistent Systems Ltd.
 
Alan Turing Centenary @ Persistent Systems
Alan Turing Centenary @ Persistent SystemsAlan Turing Centenary @ Persistent Systems
Alan Turing Centenary @ Persistent SystemsPersistent Systems Ltd.
 

More from Persistent Systems Ltd. (17)

Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
 
Embedded Linux Evolution | Turing Techtalk
Embedded Linux Evolution | Turing TechtalkEmbedded Linux Evolution | Turing Techtalk
Embedded Linux Evolution | Turing Techtalk
 
Life and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Life and Work of Ken Thompson and Dennis Ritchie | Turing TechtalkLife and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Life and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
 
Life and Work of Ivan Sutherland | Turing100@Persistent
Life and Work of Ivan Sutherland | Turing100@PersistentLife and Work of Ivan Sutherland | Turing100@Persistent
Life and Work of Ivan Sutherland | Turing100@Persistent
 
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
 
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
 
Life and Work of Judea Perl | Turing100@Persistent
Life and Work of Judea Perl | Turing100@PersistentLife and Work of Judea Perl | Turing100@Persistent
Life and Work of Judea Perl | Turing100@Persistent
 
Early History of Fortran: The Making of a Wonder | Turing100@Persistent
Early History of Fortran: The Making of a Wonder | Turing100@PersistentEarly History of Fortran: The Making of a Wonder | Turing100@Persistent
Early History of Fortran: The Making of a Wonder | Turing100@Persistent
 
Life and Work of Dr. John Backus | Turing100@Persistent
Life and Work of Dr. John Backus | Turing100@PersistentLife and Work of Dr. John Backus | Turing100@Persistent
Life and Work of Dr. John Backus | Turing100@Persistent
 
Life and Work of Jim Gray | Turing100@Persistent
Life and Work of Jim Gray | Turing100@PersistentLife and Work of Jim Gray | Turing100@Persistent
Life and Work of Jim Gray | Turing100@Persistent
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@PersistentSoftware Faults, Failures and Their Mitigations | Turing100@Persistent
Software Faults, Failures and Their Mitigations | Turing100@Persistent
 
Systems Design Experiences or Just Some War Stories…
Systems Design Experiences or Just Some War Stories…Systems Design Experiences or Just Some War Stories…
Systems Design Experiences or Just Some War Stories…
 
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@PersistentLife & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
 
Net Neutrality | Turing100@Persistent Systems
Net Neutrality | Turing100@Persistent SystemsNet Neutrality | Turing100@Persistent Systems
Net Neutrality | Turing100@Persistent Systems
 
Alan Turing Scientist Unlimited | Turing100@Persistent Systems
Alan Turing Scientist Unlimited | Turing100@Persistent SystemsAlan Turing Scientist Unlimited | Turing100@Persistent Systems
Alan Turing Scientist Unlimited | Turing100@Persistent Systems
 
Life and work of E.F. (Ted) Codd | Turing100@Persistent
Life and work of E.F. (Ted) Codd | Turing100@PersistentLife and work of E.F. (Ted) Codd | Turing100@Persistent
Life and work of E.F. (Ted) Codd | Turing100@Persistent
 
Alan Turing Centenary @ Persistent Systems
Alan Turing Centenary @ Persistent SystemsAlan Turing Centenary @ Persistent Systems
Alan Turing Centenary @ Persistent Systems
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward] | Turing100@Persistent

  • 1. 1 © Copyright 2010 UNIKEN Inc. All rights reserved Innovation Center ProductBy The Core Problem What’s exactly wrong with the internet?
  • 2. 2© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com So what’s wrong with it!! Nothing!!! • It’s cheap • Anyone can use it (no permissions required for accessing it!) • It’s available and pervasive (almost everywhere now) • Anyone can create any website, put any content, on a server, with an IP address with absolutely NO GOVERNMENT CONTROL! • Its freedom and democracy at its best! w w w. u n i k e n . c o m
  • 3. 3© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet Classification www.uniken.com Resources that REQUIRE Access Control [Online Banking] [www.bankofamerica.com] Resources that DO NOT require Access Control [News] [www.cnn.com] Users who want privacy and identity protection Users who DO NOT want privacy and identity protection Needs Secure Private Communication Does not need Secure Private Communication
  • 4. 4© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 5. 5© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE CORE PROBLEM THE CURRENT INTERNET INFRASTRUCTURE CANNOT GUARANTEE THAT THE USER IS CONNECTING TO THE DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING TO AN AUTHENTIC PRIVELEGED USER IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE ON IDENTITY OF PARTIES INVOLVED IN THE COMMUNICATION!!!
  • 6. 6© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Internet Evolution – A simplified view [ARPANET] TCP/IP DNSRouters TLS/SSL BrowsersHTML UDP Web2.0 IPSEC DNSSEC Evolution Digital Certificates Tokens (OTP) Site-Key
  • 7. 7© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Customer PC hosts INTERNET ISP DNS Server ISP INTERNET Certificate Authority Fraudster’s MachineFraudster’s Machine Fraudster’s Machine Man-in-the-middle Session Hijacking Replay Attacks Phishing Pharming Bank Datacenter Domain Registrar Registrar / Other DNS Server Man-in-the-browser Man-on-the-machine Modem The Result!
  • 8. 8© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet is being used for something that it was NOT designed for in the first place (Online Banking, Online Share trading, Enterprise Web-Applications, Mobile Internet Banking! ) Its’ designers never claimed the Internet (i.e. the packet switched network – TCP/IP/UDP) was meant for secure private communications!!
  • 9. 9© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current application services delivery model is inherently vulnerable from a security standpoint [Download Browser (from any source) -> Type URL -> Give Password -> Hope for the best!]
  • 10. 10© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com URL (domain name) (and corresponding DNS infrastructure) CANNOT be used as identity elements (identity look-up stores)(!)
  • 11. 11© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SSL/Digital Certificate based Identity/Trust Model is broken and has failed to deliver on its original promise (of providing identity to enterprises) – since it is based on a flawed trust model
  • 12. 12© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Available end-user identity technologies are not geared up to tackle the current attack vectors (OTP 2FA /Biometric became obsolete with the advent of MITM kind of attack vectors)
  • 13. 13© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current Mutual Authentication based protocols like IPSEC and the corresponding applications IPSEC/VPN are not scalable (e.g. Bank and Customers - Million end-points??)
  • 14. 14© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com End-Point Computing Environment is the new threat frontier - What can AV do if the processor cannot differentiate between an authorized and unauthorized machine code(!)
  • 15. 15© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com WHAT IS A PRIVATE (INTERNET) APPLICATION ECOSYSTEM?
  • 16. 16© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SIMPLIFY AND SECURE APPLICATION ECOSYSTEM CREATE A TECHNOLOGY ENABLED SECURE SERVICE DELIVERY PLATFORM TO ENABLE FASTER TIME TO MARKET AND INCREASED COST EFFICIENCIES Device Channel Applications EnterpriseEnd-User On Premise On Cloud Desktop/Laptop Smart Phone Tablet Internet/Intranet Employees Customers Partners ECOSYSTEM CONTEXT
  • 17. 17© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PUBLIC (mobile) APP ECOSYSTEMS Apple (iOS) Blackberry They are consumer centric and focus ONLY on mobile devices and mobile Apps While Apple and Blackberry ecosystems are closed (controlled store and proprietary devices) the rest are open Enterprises obviously cant use these consumer centric, platform dependent ecosystems for distribution, access, control and security for enterprise applications [App Store + (Proprietary) Devices] Google (Android) Windows [App Store + OS]
  • 18. 18© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet Circuits 18 Bank Users Bank Users Bank Users Users merchant Users eMail Users Social Networking Users merchant Online Bank and its customers Online Merchant and its customers Online Collaboration tools (email, chat etc) and its users Social Networking Websites and its users Online News Websites and its readers Enterprises, their employees, their customers and vendors Online Government Services and its citizens
  • 19. 19© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Features of a Private Internet Circuit • Safety – Before any communication begins between entities in a PIC, their respective identities are verified by both entities – All communication is confidential and tamper proof (encrypted) • Privileged and Exclusive – An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC access system on his/her device will not be able to access the Online Service in the PIC • Moderated and Controlled – A central PIC server will control and enable the online services available to all the users of the PIC ecosystem – The PIC Server will provision and broker identity relationships in real-time • Open and Extensible – Developers can create PIC compatible Online Services and register it with the Central PIC server for distribution to the users of the PIC ecosystem 19
  • 20. 20© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet (and Application) Ecosystem Application Store [Manage, Distribute] User Device Manager [Manage, Control] User Device Protection Technology Authentication Infrastructure Channel Security Infrastructure [Internet/Intranet] Secure Application Viewer [Application Renderer] Data Security Technology [Control, Protect] Access Management Technology [Closed, Private] PUBLIC INTERNET SERVICES (B2C) ENTERPRISE APPLICATION SERVICES (B2B or B2E) End-Point Container Technology [Security, Control]
  • 21. 21© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PRIVATE [CLOSED] INTERNET ECOSYSTEM Private Internet Ecosystem Identity Device Security Data Security Channel Security Access Management Device Management App Management Identity Protection Personal Online Identity is secured and protected Closed and Private Should not be accessible/visible from outside of the ecosystem Platform, Device and Application Type Independent Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets, Web-Apps and Mobile Apps Device, Application and Data Security Application and Device Management
  • 22. 22© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com END-USER REQUIREMENTS
  • 23. 23© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect my login credentials of various critical websites (e.g. Online Banking, Share Trading) Protect from MITM/PHISHING and other sophisticated attacks Protect my credit card/debit card information while doing ecommerce transactions Manage and Secure my personal Mobile Devices (e.g. Smart Phones, Tablets and Latops) Protect my personal data (e.g. contacts, files)
  • 24. 24© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Sophisticated Attacks MITM/PHISHING/PHARMING Sensitive Data Personal Contacts, Financial data Secure Communication Chat/File Transfer eMoney Safety Credit Card/Debit Card Ecommerce Transaction Safety
  • 25. 25© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com CIO CHALLENGES
  • 26. 26© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect Enterprise Data from leaking out Quickly deploy and rapidly roll-out new enterprise application services Manage and Secure Mobile Devices Manage Enterprise Web-Apps and Mobile Apps Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks Protect Online and Offline Content Provide Authentication to End-Users [2FA and 3FA] Provide remote support to enterprise devices Reduce the total cost of application infrastructure And many more such critical security and application management requirements..
  • 27. 27© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Multiple User Types Customers, Partners, Executive Management, Employees Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Complex Enterprise Application Landscape On-Premise Web-Apps, Mobile Apps, Hosted/Cloud Based Apps Multiple Network Types Intranet and Internet Shorter Cycles Quick Development and Launch, increasing business speed and decreasing budgets!
  • 28. 28© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE REL-ID WIDGET  Simple Client Side Software that you download from The REL-ID GATE on your desktop/Laptop/Mobile Phones/Tablets  Configure your web-sites on the REL-ID widget and enter your private secure internet world!  The REL-ID Widget connects to your configured web- sites through the REL-ID GATE (a cloud or on- premise based Private Internet Infrastructure) Gate MyData Connect MyCard Settings Exit
  • 29. 29© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (LAPTOPS/DESKTOPS)
  • 30. 30© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 31. 31© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 32. 32© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Enter previously set Device Pin
  • 33. 33© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 34. 34© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com IB User Id will get prepopulated
  • 35. 35© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (MOBILE PHONES AND TABLETS)
  • 36. 36© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 37. 37© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 38. 38© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 39. 39© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID Secure Client App Containers Web-Apps are visible and accessible only if they are provisioned in REL-ID GATETM Desktop/Laptop REL-ID Widget REL-ID Web App Viewer (Micro-Web-Apps) REL-ID Mobile APP Container REL-ID Widget securely connects to the Web-Apps via R-PCC REL-ID Web App-Viewer
  • 40. 40© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID GATE REL-ID GATE App Management Identity Management Device Management Authentication (2FA/3FA) Access Management R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Enterprise Web-Apps [Virtual Image] Enterprise Mobile Apps 3rd Party Web-Apps [Virtual Image] 3rd Party Mobile Apps Command Center Secure Channel Employee Partner Customer REL-ID Widget (Secure Client App Container) Mobile Phones, Tablets, Desktops and Laptops *R-PCC: REL-ID Private Communication Channel (Encrypted) THE REL-ID ECOTM Internet Private Data Center
  • 41. 41© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) Encrypted Communication (optional), High-Speed and Concurrent Horizontally Scalable (Millions of End-Points) Assets behind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) Application Application REL-ID PCC Agent R-PCC (REL-ID Mutually Authenticated and Encrypted Channel) Internet or Intranet
  • 42. 42© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network End-User Device Laptop Mobile Phone Tablet Desktop REL-ID Secure Container (Safe Zone) REL-ID Secure (encrypted) Data Zone 3rd Party Browser REL-ID Web-App Viewer Enterprise Apps Desktop/Laptop/Mobile REL-ID Multi-Factor Authentication 2FA/3FA R-PCC Agent R-PCC REL-ID Secure Container Technology (R-SCT) REL-ID Device Fingerprinting and Binding REL-ID Device Management And Control Module