SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
The World Internet Security Company




      Low cost
      trusted security –
      myth or reality?
      A WHITE PAPER FROM WISEKEY
The World Internet Security Company




Contents                                          Executive summary

Analogue to digital – how have trust and      3   Contrary to conventional wisdom, high-security software
security evolved?                                 solutions do not need to take up your entire annual IT
                                                  budget. And you don’t have to discard your existing
Establishing a digital identity               4
                                                  IT investments to achieve a comprehensive security
Building trust between companies and          5
                                                  solution.
individuals – where we are today?
                                                  Today, with technology enabling remote communication,
Confident collaboration                        7   the importance of trust – in the reliability of the data, the
                                                  computers or devices used and the identity of parties
Security and reliability                      8
                                                  communicating – is greater than ever. As a result, investing
Legal implications of digital transactions    9
                                                  in higher levels of digital security and authentication is
                                                  becoming a pressing requirement. Companies are under
Deploying a PKI architecture                 10   pressure from governments, customers, suppliers – and
                                                  even competitors – to scale up the level of security they
Removing complexity, increasing trust –      12   maintain in their digital transactions.
the WISeKey model

Trust neutrality                             12
                                                  But security doesn’t need to be a burden. Forward-
                                                  thinking organisations treat it as an opportunity to build
PKI for everyone                             13   greater trust in their relationships. Novel approaches
                                                  to what would otherwise be expensive and complex
Opportunities for a secure future            14   technological infrastructure projects, have been
                                                  developed and are being implemented by companies
                                                  such as WISeKey. Companies that enable the deployment
                                                  of high-security, enterprise-grade, flexible solutions, can
                                                  now do so at a total cost of ownership far lower than had
                                                  previously been thought possible.

                                                  This white paper looks at the driving need for higher
                                                  security digital systems and how organisations and
                                                  individuals can easily create their own trusted communities
                                                  – or become part of larger trusted communities.
Analogue to digital –
how have trust and security evolved?
Trust underlies the most basic transactions we conduct with          In relationships that are conducted electronically, individuals
people and organisations. The fundamental basis of that trust        are still required to make these assessments. Just as we rely
is identity – our ability to recognise the person or group of        on certain assumptions when making decisions in an analogue
people with whom we are dealing. Without this, we cannot act         environment, we also rely on electronic media to make similar
with any confidence that our counterpart will perform the task        assumptions for us. For example, is the web site we are
or function which they promise. Before we can trust, we must         purchasing from genuine? Will my payment reach the intended
first identify.                                                       party? Will the goods purchased be delivered? These are all
                                                                     questions we may also ask when dealing with someone face
Identifying the person you want to communicate with usually          to face.
involves recognising them by sight or by voice, or by having
some prior knowledge of someone or something that instils            Any person or organisation that wants to build confidence
trust. Even if an individual is not known personally to you, there   in its target audience, needs to ensure that it is trustworthy
are a number of ways of establishing a person’s credentials.         in both the digital and non-digital worlds. This is achieved
This can be through personal contacts, such as a friend or           through the way they conduct their relationships, which,
colleague, or through some form of independent verification           in turn, is dictated by the policies they implement to define
such as a passport or driving licence. In the digital world,         their activities. Many individuals and organisations will rightly
these forms of identification still exist, but they sometimes         define separate policies to apply to the different methods of
appear to us in different ways – for instance, a friend makes        communication or transaction. As electronic transactions be-
an introduction over the social utility web site Facebook rather     come more widespread, and people become more adept at
than at the gym. Whichever form identification takes, before          using technology – or, indeed, at trying to subvert technology
we can trust another party, we must first validate its identity       – increasingly sophisticated policies and techniques of
through various layers of screening.                                 assuring identity and trust will be required.

Once a person’s or organisation’s identity has been confirmed,
the next stage of the process is to establish a level of trust. We
will typically assess attributes of a person or organisation to
gauge their trustworthiness in a given situation. Again, we can
do this through personal contact, third-party recommendation,
or historical reputation. We also rely on laws and regulations to
determine whether the person or entity is fit for purpose and is
bound by certain standards of practice or competence.



                                                                     Any person or organisation that wants to
                                                                     build confidence in its target audience,
                                                                     needs to ensure that it is trustworthy –
                                                                     both in the digital and non-digital worlds.




                                                                                          Low cost trusted security – myth or reality? | 3
The World Internet Security Company




Establising a digital identity


So how can we build trust in the digital world? Identity and           • Workflow processes for approving account creation,
access management (IAM) goes a long way to achieving this                modification and assignment to specific roles – for instance,
goal. IAM is the set of processes and supporting infrastructure          change of titles, roles, jobs, schools or countries
for creating, managing and using digital identities, and               • Removing users when they no longer require access – for
enforcing security-related business policies.                            instance, leaving a job or finishing a degree in a university

The two constituent parts of IAM manage separate processes.            Access management is a process for regulating access to
                                                                       information assets by providing a policy-based control of:
Identity management is a process for managing the entire               • Who, by role, should access specific systems – for example,
lifecycle of digital identities and profiles for people, systems          who can work at a hospital
and services. It is the mapping of traditional processes to the        • What that role is permitted to do – for example, is this person
Internet-connected world and typically includes:                         a qualified doctor?
• Automated provisioning of new users – for example, creation          • What permission or restrictions are on that role – for example,
   of ID credentials in the paper-based world                            is this doctor authorised to work in the intensive care ward?
• User self-service functions – for example, changing the
   personal identification number on your bank card                     IAM infrastructures provide a framework for secure
                                                                       transactions that support both organisations’ and individuals’
                                                                       needs for a trusted online experience.


                                                         Data encryption
                                                                                    Mobile data encryption
                    E-mail encryption
                       and signature
                                                                                                                    Physical
                                                                                                                    access
                                                                                                                    control

        Mobile data
         encryption



                                                                    IDENTITY

                 Data identity
                                                                                                               More secure
                                                                                                               traditional ID
                                                                                                               credentials



                                                Intranet/extranet          User management
                                              access management


Figure 1 – Identity access management environment



4 | Low cost trusted security – myth or reality?
Building trust between companies
and individuals – where we are today
A number of factors drive the market for IAM solutions.             reputations in their offline relationships are keen to preserve
Consumers are more concerned than ever about the security           these by applying the same values to their online activities, and
of their online information. Identity theft and the fraudulent      are quick to change policies when errors arise. By adopting
use of instruments of payment are currently two of the top          this approach, these companies benefit from the contin-
concerns. A number of recent high-profile cases have arisen          ued trust of their customers. And as public pressure and
– where financial institutions have carelessly disposed of           governmental regulations grow, companies will need to take
paperwork revealing customer account details. Similarly, cases      greater measures to ensure that the flow of personal data and
have been known where bulk lists of credit-card numbers have        property over the internet is more secure, and that transactions
been illegally accessed and funds extracted. Understandably,        can be traced quickly and efficiently.
this has led to widespread concern among consumers.
                                                                    Regulatory compliance is one of the major drivers for the
There are social concerns too. In more and more households,         adoption of stronger and more sophisticated digital security
both parents now work and have less supervision over                measures. In certain contexts, companies’ IAM technologies
children’s activities online – particularly the use of chat rooms   are beginning to be audited in much the same way as their
and social networking sites. Unsupervised children can easily       finances are audited. Consequently, the technologies used
purchase items over the internet. Electronic games and movies       need to include strong control and reporting functionality.
may have age restrictions applied to their consumption, but         The extent and severity of regulations varies from country
because there are often no effective measures to establish the      to country. Multi-national companies are under pressure to
user’s age, children are able to buy them.                          interpret regulations for each location in which they operate
                                                                    and apply appropriate policies. We can see that these multi-
Issues such as these should be uppermost in the minds of            national organisations, on the whole, tend to choose the
business executives leading organisations keen to set the           strictest regulations in force and adopt those as worldwide
pace in excellent customer relationships. In the early days of e-   company policy.
commerce, many companies were concerned with protecting
their investment in the traditional sense of preventing ‘online     While the regulations themselves rarely specify the tools a
shoplifting’. Little thought was given initially to the corporate   company should deploy, they do define a set of standards,
social responsibility aspects of their online business because      practices and requirements that constitute compliance with
pressure from consumer groups and government bodies                 those regulations. For example, the Sarbanes-Oxley Act in the
did not have evidence of poor practices or wrongdoing.              United States requires that chief executive officers and chief
Today, astute enterprises are implementing policies that offer      financial officers of publicly traded companies personally ratify
protection to customers against information and property theft.     their companies’ accounts, and attest to the internal controls
Brand-leading companies that have traditionally enjoyed good        that guarantee the validity of those accounts. To comply with




                                                                                                                         Continued »



                                                                                        Low cost trusted security – myth or reality? | 5
The World Internet Security Company




this, companies need to adopt strong business processes.             believe that their investment in security and business
Confidence in the controls and reports required to endorse            continuity would be much less were it not for Sarbanes-Oxley
financial and operational statements that have to be submitted        and HIPPA regulations1. In fact, in a more recent report, 62 per
means digital security is central to these processes.                cent of respondents believed it was likely that in the next five
                                                                     years a chief information officer would be jailed for his or her
Typically, a company will need to prevent unauthorised access        company’s Sarbanes-Oxley violations2.
to documents and applications, from outsiders as well as
internal staff with legitimate access to the corporate network,      As regulatory intervention in all countries increases, so the
but not to specific content. Audit trails are also needed to          importance of software tools to assist in assuring compliance
prove that no content has been accessed by unauthorised              remains high. However, over time, the focus of that spend will
users, or any access rights have been violated. When content         evolve from deploying software to meet immediate needs,
is accessed by legitimate users, the individual who accessed         to the search for longer term cost efficiencies in compliance
it, the time and date, and the nature of any changes that were       management.
made will also be tracked and stored.
                                                                     1
                                                                         HIPPA – These are regulations in the United States governing the protection of
According to a CIO Insight survey (see Figure 2), while IT spend         individuals’ medical records and other personal health information.
on compliance is stabilising, the majority of organisations          2
                                                                         CIO Insight, January 2007




  Were it not for regulations such as Sarbanes-Oxley and HIPAA, my company’s spending on security and business continuity
  would be much less.

                         TOTAL              LESS THAN $100 million             $100-999million                           $1 billion or more


  Agree                   58%         63%                            59%                                         52%


  Disagree                42%         37%                            41%                                         48%


Figure 2 – Source: CIO Insight, June 2006




6 | Low cost trusted security – myth or reality?
Confident collaboration


With new and emerging markets, enterprises are extending            This fact alone demonstrates the clear need for strong
their reach beyond their organisational boundaries as well          security policies regarding access to corporate networks.
as traditional geographical boundaries. Being able to work          Many individuals are not aware of all the dangers outside their
effectively and flexibly without exposing itself to increased risk   PC and how their personal IT assets are being accessed.
is an important factor to consider when looking into extending      With wireless networking becoming ubiquitous in the home
an organisation’s business. Whether it’s through creating an        there are additional concerns – for example, the potential for
office in a new location, merging with or acquiring another          pharming attacks, where wireless routers are open to firmware
enterprise to gain access to new markets, or temporarily            alterations if users do not adjust the administrator settings
creating teams across organisations, extending an enterprise        and access rights. Companies therefore need to balance
infrastructure carries risks as well as opportunities. As the       the benefits of mobilising their employees against the costs
network widens, the right people need controlled access to the      of securing their networks from external attack and choose
right resources. Protecting enterprise information is essential.    appropriate safeguards against malicious activities.
But it should not be at the expense of integrity, confidentiality
and diligent management of intellectual property rights.            Businesses also need to balance these same equations when
                                                                    working with third parties. As competition becomes fiercer,
Enterprises that are looking to provide flexible working             many enterprises are looking to collaborate with partners to
practices and support mobile workforces typically will face         realise new business objectives. Information exchange is at
many of these challenges. Previously, mobile workers would          the heart of this. Organisations need to open up their networks
need to return to the office to place orders, file paperwork          – or defined portions of their networks – to entities outside
or collect new appointments. As mobile devices become               their corporate firewall, which exposes the organisation to
more widespread, more communications and transactions               new threats. People outside an organisation generally are not
are taking place away from the office, often over unsecured          subject to the same company rules or policies as an employee
networks. E-mail, mobile customer relationship management           would be. The result of this is that there are limitations in the
and other forms of network access are helping individuals           number and type of sanctions against misuse an organisation
and companies to become more productive. For instance, in           is able to impose. Therefore, in addition to technology-based
the United Kingdom, research shows that around 87 per cent          protection, non-digital policies to control behaviour on their
of remote workers use their home PCs to access company              networks should always be assessed and implemented.
data. Of these, 90 per cent admit they are responsible for
maintaining security on their PCs3.                                 3
                                                                        Reseach carried out by TNS and Bourne Vanson for ZyXEL..




                                                                    As competition becomes fiercer,
                                                                    many enterprises are looking
                                                                    to collaborate with partners to
                                                                    realise new business objectives.




                                                                                              Low cost trusted security – myth or reality? | 7
The World Internet Security Company




Security and reliability


Online fraud is on the increase. Direct losses from fraudulent   The methods used to breach security have become more
access to private information are often just the beginning.      varied. Phishing attacks, for instance, are becoming
When other factors are considered, such as legal fees arising    increasingly sophisticated. Companies can also be
from litigation, regulatory fines, the costs of countering bad    exploited through their employees, leaving data and
publicity, as well as the costs involved in closing security     financial applications vulnerable to theft or attack.
holes, the amounts involved can rise dramatically. Some          According to MessageLabs, on 12 September 2007 more
estimates in the United States put the cost of security          than 1,100 high ranking company executives worldwide
breaches at between $100 and $182 per compromised record         were deliberately targeted. The e-mails sent to them
– some estimates almost double these figures. For large-scale     claimed to be from a recruitment firm and mimicked a
breaches this means companies could potentially face costs       Microsoft error message to trick recipients into clicking on
into millions of dollars.                                        a malicious attachment. Assuming these executives have
                                                                 legitimate access to highly sensitive company data and
                                                                 systems, the potential threat is clear.




   The methods used to breach security have become more
   varied. Phishing attacks, for instance, are becoming
   increasingly sophisticated. Companies can also be
   exploited through their employees, leaving data and
   financial applications vulnerable to theft or attack.




8 | Low cost trusted security – myth or reality?
Legal implications of digital transactions


In addition to compliance regulations, the legal exposure              IT has increased the facility with which this is done as well
organisations are subject to do not change in the electronic           as the risks of infringing the data protection laws applicable
world and therefore need to be conscientiously assessed.               across Europe and many other countries worldwide.
Secure identity and access management technologies play a            • Ensuring service levels with customers: ensuring the security
key role in ensuring the substantial reduction of legal risks to       of operations to meet contractually binding service levels
companies.                                                             is essential. The identity of individuals operating these
                                                                       services, as well as their access, is key to reducing the risk
For example, in the past, ensuring third-party compliance              of not meeting the service levels and those exposing an
with obligations of confidentiality meant storing documents             organisation to liability.
in a locked office and/or filing cabinet. Today, much of the           • Demateralisation: the digitalisation of documents – for
same confidential information is stored electronically and is           example, invoices and accounting records – is widespread
accessible remotely. Ensuring that only authorised people              but compliance with the applicable law is becoming an
access such data – and that its use be in compliance with any          increasing problem for organisations. Non-compliance with
confidentiality undertakings – depends on ensuring secure               such regulations can result if hefty fines and, in some cases,
identity and access management systems. This is just one               criminal proceedings.
example of a wide variety of areas in which organisations
are having to manage their increased legal exposure due              Other legal exposure areas are more specific to certain
to the popularity of their web sites. Other areas that affect        industries such as the financial services sector, health sector
organisations include:                                               and defence contracting.

• Protection of intellectual property rights: ensuring that the      The points outlined above represent some of the challenges
  person developing any intellectual property is bound by the        faced by individuals and organisations. As techniques evolve
  appropriate terms to guarantee those rights are allocated to a     to take advantage of security weaknesses, so do the laws,
  specific organisation. For example, the cross-organisational        practices and technologies designed to counter them. In
  collaboration scenario where it is sometimes unclear who           the past, the ability to implement policies and technologies
  retains the IP developed.                                          that can enable high-security protection of physical and
• Ensuring compliance with data protection regulations:              information assets have been mostly the preserve of large
  organisations regularly share all sorts of data concerning their   organisations. Today there are technologically advanced
  employees, partners and customers that may even include            solutions available that are simple to deploy and do not require
  sensitive data such as race or political affiliations.              investments of millions of dollars. WISeKey is at the forefront of
                                                                     developing and deploying these technologies.




                                                                                          Low cost trusted security – myth or reality? | 9
The World Internet Security Company




Deploying a PKI architecture


Historically, systems providing the highest level of security        When deploying PKI, much importance has been placed on
have been those based on public key infrastructures (PKIs).          training all users how to keep their certificates secure – even
A PKI is an arrangement that binds public cryptographic              when they upgrade their computers, or have them repaired.
keys with respective user identities by means of a certificate
authority (CA). The user identity must be unique for each CA.        Putting this into practice in a large organisation has proved
Identity validation is carried out by software at a CA, usually      far more expensive to deploy than was initially imagined.
based on some form of human supervision, together with               The reason for this has been due typically to simple under
other coordinated software at distributed locations. For each        budgeting, complex business process audits and subsequent
user, the user identity, the public key, their binding, validity     re-engineering, along with the cost of setting up CAs and
conditions and other attributes are not susceptible to forgery       other related systems. Other causes for complaints are that
in public key certificates issued by the CA. The infrastructure       the operational costs of maintaining the infrastructure, keys,
typically is also composed of: a lightweight directory access        hardware and specialised data centre operations.
protocol (LDAP) directory; a CA; a Registration Authority (RA);
Certificate Revocation Lists (CRL) that can get unwieldy when         These so called horror stories certainly have their basis in truth.
they are checked; Online Certificate Status Protocol (OCSP),          It is also true that many security software vendors sell full-scale,
screening certificates in real time; and digital certificates that     in-house PKI solutions that do have large up-front costs, as
must be issued to all parties before they can use the PKI.           well as high ongoing support and management overheads.




                                                        CUSTOMER GETS THIS MUCH


  HUMAN                                SERVICES                       INFRASTRUCTURE                    LEGAL

  Registration Authority               Deployment Training            Software                          Liability
  Management
                                                                      Hardware
  Certificate Authority                 Technology Upgrade Training
  Management                                                          Hardware Upgrade for
                                                                      Scalability
  Operation and Maintenance            Consultancy                                                      Certificate Policies and
                                                                      Upgrades due to Technology        Practices
                                                                      Changes
  Project Management                   Security Audit
  and Deployment                                                      Secure Processing Facility


                                                        CUSTOMER PAYS THIS MUCH


Figure 3 – Typical in-house PKI implementation




10 | Low cost trusted security – myth or reality?
Some large organisations can afford to make these                       Certificates are the commonly accepted
investments and will do so if they believe the benefits will justify
                                                                        method for authenticating and protecting
those costs. Other organisations may not be able to justify
the investment, but require the same high level of security.            valuable transactions, beginning with
Previously these organisations have had to make do with
                                                                        their fairly transparent use in enabling
systems that offer lower levels of security or trust.
                                                                        secure socket layer (SSL) web sites.
As an alternative to this in-house model, certain companies
                                                                        Certificates are also supported in all major
offer a managed model by which the infrastructure is located
centrally in a shared environment. This enables organisations           web browsers, which is not the case for
to relatively (but not substantially) reduce the costs and
                                                                        PGP keys and other alternatives, allowing
complexity of implementing PKI. This approach, however, has
had several problems over the years, including:                         easy client authentication.

• The centralised location of sensitive data – bank customer
  identities
• Loose integration with the backend systems of organisations         So much so, that the majority of enterprises are now
  – making seamless identity and access management difficult           preferring PKI over alternative solutions. Today, vendors such
• Full dependence on an external organisation for security of         as WISeKey offer highly secure PKI solutions that are cost
  sensitive activities                                                efficient to both deploy and maintain.
• Geopolitical concerns – many of the managed service
  providers operate out of the United States                          PKI solutions also bring benefits such as much broader
                                                                      operating system and application adoption. Certificates are the
Some debate has taken place as to whether alternatives                commonly accepted method for authenticating and protecting
such as Pretty Good Privacy (PGP) are better than PKI. PGP            valuable transactions, beginning with their fairly transparent
and other alternatives have their benefits – a lower cost of           use in enabling secure socket layer (SSL) web sites.
deployment may sometimes be quoted as one of them.                    Certificates are also supported in all major web browsers,
However, their drawbacks, such as requiring client software at        which is not the case for PGP keys and other alternatives,
the sender and recipient ends or not having the scalability of        allowing easy client authentication. The same is true for secure
PKI, tend to outweigh the benefits.                                    devices such as smart cards and USB tokens.




                                                                                         Low cost trusted security – myth or reality? | 11
The World Internet Security Company




Removing complexity, increasing trust –
the WISeKey model
WISeKey has been analysing the issues surrounding security            The WISeKey model is unique in two ways:
for many years. The company’s specialists have experience
of highly sensitive environments – for example, they were             1) It offers a totally neutral trust model founded on its
involved in first ever legally binding Internet voting system             Swiss origins and its association with the Organisation
– as well as highly complex environments with technologically            Internationale pour la Securité des Transactions
challenged infrastructures, such as in developing countries.             Electroniques (OISTE) foundation
WISeKey has built on the lessons learned and made the
security, reliability, cost effectiveness and practicality of using   2) It brings PKI benefits to the mass market at an affordable
PKIs a reality. As a result, WISeKey has put sophisticated PKI           price by taking advantage of the PKI technology built-in to
implementations within reach of organisations of any size, as            Microsoft Windows Server software
well as individuals.




Trust neutrality
With its headquarters in Switzerland, WISeKey operates                laws, no private or government body can force the root key
under Switzerland’s established political neutrality, security,       to be divulged. This guarantees that all information and data
confidentiality and efficiency laws. These are all essential            en-crypted through OISTE/WISeKey certificates will remain
requirements for the mass deployment of secure identity and           secure. This approach is unique as no other infrastructure of
access management infrastructures.                                    its kind exists in such a high security environment, and the
                                                                      level of neutrality and protection afforded by stringent Swiss
WISeKey acts as the business operator for OISTE root                  confidentiality and security laws is second to none.
cryptographic keys. The OISTE Foundation is a non-profit
international organisation based in Geneva, Switzerland.
Founded in 1998, OISTE was created with the objectives of
promoting the use and adoption of international standards
to secure electronic transactions, expand the use of digital
certification and ensure the interoperability of certification
authorities’ e-transaction systems.

The OISTE/WISeKey root is an offline root certificate for
signing certification authorities and backed by OISTE. It is the
basis for all other certificates issued through not just WISeKey
solutions, but any other solutions accepted by the foundation,
which are able to comply with the policies and practices
that are applicable (see Figure 4). The OISTE/WISeKey root
systems were created and maintained in a secure bunker                                                                Figure 4 –
under the Swiss Alps recognised as one of the most secure                                                             The OISTE
areas in the world today. Because of Swiss confidentiality                                                             trust model


12 | Low cost trusted security – myth or reality?
PKI for everyone


WISeKey recognised some of the challenges faced by large                   This approach also allows WISeKey to provide companies
and small organisations in deploying PKIs. WISeKey has                     with the flexibility and scalability they need to satisfy their own
been involved in large scale PKI projects with some or the                 requirements. Companies can choose to deploy a framework
world’s largest private and public sector organisations. As                hosted entirely within their own facility, or partner with WISeKey
the company developed its expertise in managing these                      to implement a managed service hosted at WISeKey’s secure
deployments, it was also quick to recognise where problems                 data centre. In essence, the approach taken by WISeKey can
arose, and where costs could be controlled.                                provide certification services to a two to five person company
                                                                           all the way up to a national identity system, with very flexible
As a result, WISeKey has developed a suite of products that                forms of deployment, be it in-house, managed, ASP mode or a
reduces complexity and costs at a stroke by enabling its                   series of other hybrid combinations of these.
products to benefit from the digital certification technology
already built in to the Windows Server platform. This suite also           Individuals can benefit too. Employees within an organisation
provides specialised, high-security components that extend                 can use the trusted electronic Identity (eID) not just in their
and enhance the Microsoft technology into a full-scale industry            business activities, but their personal lives too. If an individual
strength PKI.                                                              wishes to create a personal eID, they can do so by using
                                                                           their company CA to validate their ID with WISeKey directly
This approach means businesses of any size are able to                     and obtain an ID that is not linked to the company for which
develop enterprise class security policies in the knowledge that           they work. This provides a trusted eID, which they can use
they can make full use of their existing technology investments            wherever they are, and on any secure storage device that will
to help put the policies into practice.                                    be accepted across the internet for secure communications
                                                                           and transactions.




                                                                                                Cost of a typical PKI implementation
                                                                                                (set up, operation and maintenance)

            Exchange    Active Directory          SQL Server 2005         Public WebServer
                                                CertifyID Guardian DB   CertifyID CRL Manager
                                                                                                Reduction of costs and complexity
                                                                            SSL Certificate      through a WISeKey implementation


                                                                                                • Reduced technical complexity
                                                                                                • Tighter integration into back end systems
                                           Certificate Authority
                                           CertifyID Blackbox                                   • Reduced need for specialised staff
                                           CertifyID Guardian
                                                                                                • Different licensing models
                                                                                                • Implementation flexibility: in-house,
                                                                                                  managed, ASP, hybrids, and others



                                                                                                                                              =
Figure 5 – WISeKey PKI implementation



                                                                                                Low cost trusted security – myth or reality? | 13
The World Internet Security Company




Opportunities for a secure future


More people than ever are using the internet to make                  Customers are becoming more sophisticated in their use
purchases, manage finances and complete tax returns                    of online resources, and are sensitive about the privacy
– to name but a few transactions. It is also true to say most         and security of their data. When enterprises fail to take this
consumers are suspicious of internet security. However, all the       seriously and breaches occur, the speed at which these lapses
signs show that despite the suspicion, people’s confidence in          are communicated to others can be breathtaking. This can
using the internet for these sorts of transactions is growing.        create significant problems in retaining the trust of existing
This evolution is also affecting businesses. Mobile devices           customers and attracting new ones. Companies that look
and the infrastructure required to support them is making a           to harness security technologies with the aim of enhancing
compelling business case for enterprises to change the way            customer confidence, the relationship of trust, and ease of use
they do business and companies of all sizes are quick to see          they experience when managing transactions online, will gain a
the competitive benefits in mobilising their operations.               significant advantage over their competitors.

Statutory requirements are difficult to predict because laws           Successful companies are looking to IAM as a central
change to reflect current social and economic realities.               force in their strategy to manage these risks and realise
As government regulations catch up with technology and                the opportunities that increased security investments can
requirements for compliance and reporting increase, the need          produce. After many years of waiting, using PKI-based IAM
to manage these processes over digital networks will increase.        as a basis for secure communications is now becoming a
Organisations that are able to monitor and authenticate their         viable solution for organisations of all sizes, not just large
transactions efficiently, and ensure that the privacy of the data      corporations or government agencies. Enterprises should
they hold is maintained will be better positioned to adjust to        be looking at security and privacy as a business opportunity
future requirements of this nature.                                   to future-proof their regulatory compliance requirements,
                                                                      streamline their business operations and increase customer
Similarly, it is difficult to predict who you will be doing business   trust. Companies that regard it as a necessary evil – one
with tomorrow, next month or next year. Your competitor               that must be endured in order to minimise their own legal or
today may become your trading partner tomorrow. Being able            commercial liabilities – may find themselves outperformed by
to collaborate and exchange information according to the              more visionary competitors.
requirements of a partnership could be crucial to success.
Securing information access portals that facilitate this type
of activity without risking exposure of company secrets to
unauthorised parties will become ever more important. It
could even make the difference between winning and losing a
lucrative trading partnership.




14 | Low cost trusted security – myth or reality?
Enterprises should be looking at security and privacy
as a business opportunity to future-proof their
regulatory compliance requirements, streamline their
business operations and increase customer trust.
Companies that regard it as a necessary evil – one
that must be endured in order to minimise their own
legal or commercial liabilities – may find themselves
outperformed by more visionary competitors.
The World Internet Security Company




For more information on WISeKey        WISeKey
solutions please contact:              WTC II

info@wisekey.com                       route de Pré-Bois 29
                                       P.O. Box 885
                                       CH-1215 Geneva 15
                                       Switzerland
Or visit:

www.wisekey.com                        Telephone: +41 22 594 3000

Más contenido relacionado

La actualidad más candente

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperMartin Ruubel
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
Tailored Interactions
Tailored InteractionsTailored Interactions
Tailored InteractionsSimon King
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record managementGreenLeafInst
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled PrivacyOwen Sacco
 
Simplified Business Event Processing
Simplified Business Event ProcessingSimplified Business Event Processing
Simplified Business Event ProcessingNigel Green
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Data protection guide
Data protection guideData protection guide
Data protection guidepetertran
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 

La actualidad más candente (20)

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
Tailored Interactions
Tailored InteractionsTailored Interactions
Tailored Interactions
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled Privacy
 
Simplified Business Event Processing
Simplified Business Event ProcessingSimplified Business Event Processing
Simplified Business Event Processing
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Data protection guide
Data protection guideData protection guide
Data protection guide
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 

Destacado (19)

Bombillo incandescente
Bombillo incandescenteBombillo incandescente
Bombillo incandescente
 
Cc4 2011-2012 bib
Cc4 2011-2012 bibCc4 2011-2012 bib
Cc4 2011-2012 bib
 
ReklamıDeryasunum
ReklamıDeryasunumReklamıDeryasunum
ReklamıDeryasunum
 
Gluco Center Concept Paper 2009
Gluco Center Concept Paper 2009Gluco Center Concept Paper 2009
Gluco Center Concept Paper 2009
 
Brazil JV
Brazil JVBrazil JV
Brazil JV
 
Manas Background Ppt
Manas Background PptManas Background Ppt
Manas Background Ppt
 
Value Of Awareness, Education, Training On Motivation & Compliance
Value Of Awareness, Education, Training On Motivation & ComplianceValue Of Awareness, Education, Training On Motivation & Compliance
Value Of Awareness, Education, Training On Motivation & Compliance
 
Roche Genentech Acquisition Analysis
Roche   Genentech Acquisition AnalysisRoche   Genentech Acquisition Analysis
Roche Genentech Acquisition Analysis
 
Para Los Que
Para Los QuePara Los Que
Para Los Que
 
2
22
2
 
Module 2 Power Point
Module 2 Power PointModule 2 Power Point
Module 2 Power Point
 
Web2nov2008
Web2nov2008Web2nov2008
Web2nov2008
 
Edtech Intro New
Edtech Intro NewEdtech Intro New
Edtech Intro New
 
Europa Cerrada
Europa CerradaEuropa Cerrada
Europa Cerrada
 
A Caminho De ...
A Caminho De ...A Caminho De ...
A Caminho De ...
 
Novara
NovaraNovara
Novara
 
Grupo B Vidrio
Grupo B VidrioGrupo B Vidrio
Grupo B Vidrio
 
[Concert Per Clarinet 2on Mov Mozart]
[Concert Per Clarinet 2on Mov Mozart][Concert Per Clarinet 2on Mov Mozart]
[Concert Per Clarinet 2on Mov Mozart]
 
El Lugar
El LugarEl Lugar
El Lugar
 

Similar a Wk White Paper

Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
All the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfAll the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfDrysign By Exela
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
Ulf mattsson the standardization of tokenization and moving beyond pci
Ulf mattsson   the standardization of tokenization and moving beyond pciUlf mattsson   the standardization of tokenization and moving beyond pci
Ulf mattsson the standardization of tokenization and moving beyond pciUlf Mattsson
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Drysign By Exela
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsJoyce Brocaglia
 

Similar a Wk White Paper (20)

Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
All the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfAll the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdf
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Ulf mattsson the standardization of tokenization and moving beyond pci
Ulf mattsson   the standardization of tokenization and moving beyond pciUlf mattsson   the standardization of tokenization and moving beyond pci
Ulf mattsson the standardization of tokenization and moving beyond pci
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
 

Más de Creus Moreira Carlos

Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Creus Moreira Carlos
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheCreus Moreira Carlos
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paperCreus Moreira Carlos
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Creus Moreira Carlos
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg businessCreus Moreira Carlos
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth CompaniesCreus Moreira Carlos
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...Creus Moreira Carlos
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraCreus Moreira Carlos
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status Creus Moreira Carlos
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Creus Moreira Carlos
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 

Más de Creus Moreira Carlos (20)

Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paper
 
wisekey history
wisekey historywisekey history
wisekey history
 
WISekey presentation
WISekey presentation WISekey presentation
WISekey presentation
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Ft ifa football a4 brochure
Ft ifa football a4 brochureFt ifa football a4 brochure
Ft ifa football a4 brochure
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos Moreira
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
 
Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)
 
Bilan fev 2012 300dpi
Bilan fev 2012 300dpiBilan fev 2012 300dpi
Bilan fev 2012 300dpi
 
Fcb 4
Fcb 4Fcb 4
Fcb 4
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Wk White Paper

  • 1. The World Internet Security Company Low cost trusted security – myth or reality? A WHITE PAPER FROM WISEKEY
  • 2. The World Internet Security Company Contents Executive summary Analogue to digital – how have trust and 3 Contrary to conventional wisdom, high-security software security evolved? solutions do not need to take up your entire annual IT budget. And you don’t have to discard your existing Establishing a digital identity 4 IT investments to achieve a comprehensive security Building trust between companies and 5 solution. individuals – where we are today? Today, with technology enabling remote communication, Confident collaboration 7 the importance of trust – in the reliability of the data, the computers or devices used and the identity of parties Security and reliability 8 communicating – is greater than ever. As a result, investing Legal implications of digital transactions 9 in higher levels of digital security and authentication is becoming a pressing requirement. Companies are under Deploying a PKI architecture 10 pressure from governments, customers, suppliers – and even competitors – to scale up the level of security they Removing complexity, increasing trust – 12 maintain in their digital transactions. the WISeKey model Trust neutrality 12 But security doesn’t need to be a burden. Forward- thinking organisations treat it as an opportunity to build PKI for everyone 13 greater trust in their relationships. Novel approaches to what would otherwise be expensive and complex Opportunities for a secure future 14 technological infrastructure projects, have been developed and are being implemented by companies such as WISeKey. Companies that enable the deployment of high-security, enterprise-grade, flexible solutions, can now do so at a total cost of ownership far lower than had previously been thought possible. This white paper looks at the driving need for higher security digital systems and how organisations and individuals can easily create their own trusted communities – or become part of larger trusted communities.
  • 3. Analogue to digital – how have trust and security evolved? Trust underlies the most basic transactions we conduct with In relationships that are conducted electronically, individuals people and organisations. The fundamental basis of that trust are still required to make these assessments. Just as we rely is identity – our ability to recognise the person or group of on certain assumptions when making decisions in an analogue people with whom we are dealing. Without this, we cannot act environment, we also rely on electronic media to make similar with any confidence that our counterpart will perform the task assumptions for us. For example, is the web site we are or function which they promise. Before we can trust, we must purchasing from genuine? Will my payment reach the intended first identify. party? Will the goods purchased be delivered? These are all questions we may also ask when dealing with someone face Identifying the person you want to communicate with usually to face. involves recognising them by sight or by voice, or by having some prior knowledge of someone or something that instils Any person or organisation that wants to build confidence trust. Even if an individual is not known personally to you, there in its target audience, needs to ensure that it is trustworthy are a number of ways of establishing a person’s credentials. in both the digital and non-digital worlds. This is achieved This can be through personal contacts, such as a friend or through the way they conduct their relationships, which, colleague, or through some form of independent verification in turn, is dictated by the policies they implement to define such as a passport or driving licence. In the digital world, their activities. Many individuals and organisations will rightly these forms of identification still exist, but they sometimes define separate policies to apply to the different methods of appear to us in different ways – for instance, a friend makes communication or transaction. As electronic transactions be- an introduction over the social utility web site Facebook rather come more widespread, and people become more adept at than at the gym. Whichever form identification takes, before using technology – or, indeed, at trying to subvert technology we can trust another party, we must first validate its identity – increasingly sophisticated policies and techniques of through various layers of screening. assuring identity and trust will be required. Once a person’s or organisation’s identity has been confirmed, the next stage of the process is to establish a level of trust. We will typically assess attributes of a person or organisation to gauge their trustworthiness in a given situation. Again, we can do this through personal contact, third-party recommendation, or historical reputation. We also rely on laws and regulations to determine whether the person or entity is fit for purpose and is bound by certain standards of practice or competence. Any person or organisation that wants to build confidence in its target audience, needs to ensure that it is trustworthy – both in the digital and non-digital worlds. Low cost trusted security – myth or reality? | 3
  • 4. The World Internet Security Company Establising a digital identity So how can we build trust in the digital world? Identity and • Workflow processes for approving account creation, access management (IAM) goes a long way to achieving this modification and assignment to specific roles – for instance, goal. IAM is the set of processes and supporting infrastructure change of titles, roles, jobs, schools or countries for creating, managing and using digital identities, and • Removing users when they no longer require access – for enforcing security-related business policies. instance, leaving a job or finishing a degree in a university The two constituent parts of IAM manage separate processes. Access management is a process for regulating access to information assets by providing a policy-based control of: Identity management is a process for managing the entire • Who, by role, should access specific systems – for example, lifecycle of digital identities and profiles for people, systems who can work at a hospital and services. It is the mapping of traditional processes to the • What that role is permitted to do – for example, is this person Internet-connected world and typically includes: a qualified doctor? • Automated provisioning of new users – for example, creation • What permission or restrictions are on that role – for example, of ID credentials in the paper-based world is this doctor authorised to work in the intensive care ward? • User self-service functions – for example, changing the personal identification number on your bank card IAM infrastructures provide a framework for secure transactions that support both organisations’ and individuals’ needs for a trusted online experience. Data encryption Mobile data encryption E-mail encryption and signature Physical access control Mobile data encryption IDENTITY Data identity More secure traditional ID credentials Intranet/extranet User management access management Figure 1 – Identity access management environment 4 | Low cost trusted security – myth or reality?
  • 5. Building trust between companies and individuals – where we are today A number of factors drive the market for IAM solutions. reputations in their offline relationships are keen to preserve Consumers are more concerned than ever about the security these by applying the same values to their online activities, and of their online information. Identity theft and the fraudulent are quick to change policies when errors arise. By adopting use of instruments of payment are currently two of the top this approach, these companies benefit from the contin- concerns. A number of recent high-profile cases have arisen ued trust of their customers. And as public pressure and – where financial institutions have carelessly disposed of governmental regulations grow, companies will need to take paperwork revealing customer account details. Similarly, cases greater measures to ensure that the flow of personal data and have been known where bulk lists of credit-card numbers have property over the internet is more secure, and that transactions been illegally accessed and funds extracted. Understandably, can be traced quickly and efficiently. this has led to widespread concern among consumers. Regulatory compliance is one of the major drivers for the There are social concerns too. In more and more households, adoption of stronger and more sophisticated digital security both parents now work and have less supervision over measures. In certain contexts, companies’ IAM technologies children’s activities online – particularly the use of chat rooms are beginning to be audited in much the same way as their and social networking sites. Unsupervised children can easily finances are audited. Consequently, the technologies used purchase items over the internet. Electronic games and movies need to include strong control and reporting functionality. may have age restrictions applied to their consumption, but The extent and severity of regulations varies from country because there are often no effective measures to establish the to country. Multi-national companies are under pressure to user’s age, children are able to buy them. interpret regulations for each location in which they operate and apply appropriate policies. We can see that these multi- Issues such as these should be uppermost in the minds of national organisations, on the whole, tend to choose the business executives leading organisations keen to set the strictest regulations in force and adopt those as worldwide pace in excellent customer relationships. In the early days of e- company policy. commerce, many companies were concerned with protecting their investment in the traditional sense of preventing ‘online While the regulations themselves rarely specify the tools a shoplifting’. Little thought was given initially to the corporate company should deploy, they do define a set of standards, social responsibility aspects of their online business because practices and requirements that constitute compliance with pressure from consumer groups and government bodies those regulations. For example, the Sarbanes-Oxley Act in the did not have evidence of poor practices or wrongdoing. United States requires that chief executive officers and chief Today, astute enterprises are implementing policies that offer financial officers of publicly traded companies personally ratify protection to customers against information and property theft. their companies’ accounts, and attest to the internal controls Brand-leading companies that have traditionally enjoyed good that guarantee the validity of those accounts. To comply with Continued » Low cost trusted security – myth or reality? | 5
  • 6. The World Internet Security Company this, companies need to adopt strong business processes. believe that their investment in security and business Confidence in the controls and reports required to endorse continuity would be much less were it not for Sarbanes-Oxley financial and operational statements that have to be submitted and HIPPA regulations1. In fact, in a more recent report, 62 per means digital security is central to these processes. cent of respondents believed it was likely that in the next five years a chief information officer would be jailed for his or her Typically, a company will need to prevent unauthorised access company’s Sarbanes-Oxley violations2. to documents and applications, from outsiders as well as internal staff with legitimate access to the corporate network, As regulatory intervention in all countries increases, so the but not to specific content. Audit trails are also needed to importance of software tools to assist in assuring compliance prove that no content has been accessed by unauthorised remains high. However, over time, the focus of that spend will users, or any access rights have been violated. When content evolve from deploying software to meet immediate needs, is accessed by legitimate users, the individual who accessed to the search for longer term cost efficiencies in compliance it, the time and date, and the nature of any changes that were management. made will also be tracked and stored. 1 HIPPA – These are regulations in the United States governing the protection of According to a CIO Insight survey (see Figure 2), while IT spend individuals’ medical records and other personal health information. on compliance is stabilising, the majority of organisations 2 CIO Insight, January 2007 Were it not for regulations such as Sarbanes-Oxley and HIPAA, my company’s spending on security and business continuity would be much less. TOTAL LESS THAN $100 million $100-999million $1 billion or more Agree 58% 63% 59% 52% Disagree 42% 37% 41% 48% Figure 2 – Source: CIO Insight, June 2006 6 | Low cost trusted security – myth or reality?
  • 7. Confident collaboration With new and emerging markets, enterprises are extending This fact alone demonstrates the clear need for strong their reach beyond their organisational boundaries as well security policies regarding access to corporate networks. as traditional geographical boundaries. Being able to work Many individuals are not aware of all the dangers outside their effectively and flexibly without exposing itself to increased risk PC and how their personal IT assets are being accessed. is an important factor to consider when looking into extending With wireless networking becoming ubiquitous in the home an organisation’s business. Whether it’s through creating an there are additional concerns – for example, the potential for office in a new location, merging with or acquiring another pharming attacks, where wireless routers are open to firmware enterprise to gain access to new markets, or temporarily alterations if users do not adjust the administrator settings creating teams across organisations, extending an enterprise and access rights. Companies therefore need to balance infrastructure carries risks as well as opportunities. As the the benefits of mobilising their employees against the costs network widens, the right people need controlled access to the of securing their networks from external attack and choose right resources. Protecting enterprise information is essential. appropriate safeguards against malicious activities. But it should not be at the expense of integrity, confidentiality and diligent management of intellectual property rights. Businesses also need to balance these same equations when working with third parties. As competition becomes fiercer, Enterprises that are looking to provide flexible working many enterprises are looking to collaborate with partners to practices and support mobile workforces typically will face realise new business objectives. Information exchange is at many of these challenges. Previously, mobile workers would the heart of this. Organisations need to open up their networks need to return to the office to place orders, file paperwork – or defined portions of their networks – to entities outside or collect new appointments. As mobile devices become their corporate firewall, which exposes the organisation to more widespread, more communications and transactions new threats. People outside an organisation generally are not are taking place away from the office, often over unsecured subject to the same company rules or policies as an employee networks. E-mail, mobile customer relationship management would be. The result of this is that there are limitations in the and other forms of network access are helping individuals number and type of sanctions against misuse an organisation and companies to become more productive. For instance, in is able to impose. Therefore, in addition to technology-based the United Kingdom, research shows that around 87 per cent protection, non-digital policies to control behaviour on their of remote workers use their home PCs to access company networks should always be assessed and implemented. data. Of these, 90 per cent admit they are responsible for maintaining security on their PCs3. 3 Reseach carried out by TNS and Bourne Vanson for ZyXEL.. As competition becomes fiercer, many enterprises are looking to collaborate with partners to realise new business objectives. Low cost trusted security – myth or reality? | 7
  • 8. The World Internet Security Company Security and reliability Online fraud is on the increase. Direct losses from fraudulent The methods used to breach security have become more access to private information are often just the beginning. varied. Phishing attacks, for instance, are becoming When other factors are considered, such as legal fees arising increasingly sophisticated. Companies can also be from litigation, regulatory fines, the costs of countering bad exploited through their employees, leaving data and publicity, as well as the costs involved in closing security financial applications vulnerable to theft or attack. holes, the amounts involved can rise dramatically. Some According to MessageLabs, on 12 September 2007 more estimates in the United States put the cost of security than 1,100 high ranking company executives worldwide breaches at between $100 and $182 per compromised record were deliberately targeted. The e-mails sent to them – some estimates almost double these figures. For large-scale claimed to be from a recruitment firm and mimicked a breaches this means companies could potentially face costs Microsoft error message to trick recipients into clicking on into millions of dollars. a malicious attachment. Assuming these executives have legitimate access to highly sensitive company data and systems, the potential threat is clear. The methods used to breach security have become more varied. Phishing attacks, for instance, are becoming increasingly sophisticated. Companies can also be exploited through their employees, leaving data and financial applications vulnerable to theft or attack. 8 | Low cost trusted security – myth or reality?
  • 9. Legal implications of digital transactions In addition to compliance regulations, the legal exposure IT has increased the facility with which this is done as well organisations are subject to do not change in the electronic as the risks of infringing the data protection laws applicable world and therefore need to be conscientiously assessed. across Europe and many other countries worldwide. Secure identity and access management technologies play a • Ensuring service levels with customers: ensuring the security key role in ensuring the substantial reduction of legal risks to of operations to meet contractually binding service levels companies. is essential. The identity of individuals operating these services, as well as their access, is key to reducing the risk For example, in the past, ensuring third-party compliance of not meeting the service levels and those exposing an with obligations of confidentiality meant storing documents organisation to liability. in a locked office and/or filing cabinet. Today, much of the • Demateralisation: the digitalisation of documents – for same confidential information is stored electronically and is example, invoices and accounting records – is widespread accessible remotely. Ensuring that only authorised people but compliance with the applicable law is becoming an access such data – and that its use be in compliance with any increasing problem for organisations. Non-compliance with confidentiality undertakings – depends on ensuring secure such regulations can result if hefty fines and, in some cases, identity and access management systems. This is just one criminal proceedings. example of a wide variety of areas in which organisations are having to manage their increased legal exposure due Other legal exposure areas are more specific to certain to the popularity of their web sites. Other areas that affect industries such as the financial services sector, health sector organisations include: and defence contracting. • Protection of intellectual property rights: ensuring that the The points outlined above represent some of the challenges person developing any intellectual property is bound by the faced by individuals and organisations. As techniques evolve appropriate terms to guarantee those rights are allocated to a to take advantage of security weaknesses, so do the laws, specific organisation. For example, the cross-organisational practices and technologies designed to counter them. In collaboration scenario where it is sometimes unclear who the past, the ability to implement policies and technologies retains the IP developed. that can enable high-security protection of physical and • Ensuring compliance with data protection regulations: information assets have been mostly the preserve of large organisations regularly share all sorts of data concerning their organisations. Today there are technologically advanced employees, partners and customers that may even include solutions available that are simple to deploy and do not require sensitive data such as race or political affiliations. investments of millions of dollars. WISeKey is at the forefront of developing and deploying these technologies. Low cost trusted security – myth or reality? | 9
  • 10. The World Internet Security Company Deploying a PKI architecture Historically, systems providing the highest level of security When deploying PKI, much importance has been placed on have been those based on public key infrastructures (PKIs). training all users how to keep their certificates secure – even A PKI is an arrangement that binds public cryptographic when they upgrade their computers, or have them repaired. keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. Putting this into practice in a large organisation has proved Identity validation is carried out by software at a CA, usually far more expensive to deploy than was initially imagined. based on some form of human supervision, together with The reason for this has been due typically to simple under other coordinated software at distributed locations. For each budgeting, complex business process audits and subsequent user, the user identity, the public key, their binding, validity re-engineering, along with the cost of setting up CAs and conditions and other attributes are not susceptible to forgery other related systems. Other causes for complaints are that in public key certificates issued by the CA. The infrastructure the operational costs of maintaining the infrastructure, keys, typically is also composed of: a lightweight directory access hardware and specialised data centre operations. protocol (LDAP) directory; a CA; a Registration Authority (RA); Certificate Revocation Lists (CRL) that can get unwieldy when These so called horror stories certainly have their basis in truth. they are checked; Online Certificate Status Protocol (OCSP), It is also true that many security software vendors sell full-scale, screening certificates in real time; and digital certificates that in-house PKI solutions that do have large up-front costs, as must be issued to all parties before they can use the PKI. well as high ongoing support and management overheads. CUSTOMER GETS THIS MUCH HUMAN SERVICES INFRASTRUCTURE LEGAL Registration Authority Deployment Training Software Liability Management Hardware Certificate Authority Technology Upgrade Training Management Hardware Upgrade for Scalability Operation and Maintenance Consultancy Certificate Policies and Upgrades due to Technology Practices Changes Project Management Security Audit and Deployment Secure Processing Facility CUSTOMER PAYS THIS MUCH Figure 3 – Typical in-house PKI implementation 10 | Low cost trusted security – myth or reality?
  • 11. Some large organisations can afford to make these Certificates are the commonly accepted investments and will do so if they believe the benefits will justify method for authenticating and protecting those costs. Other organisations may not be able to justify the investment, but require the same high level of security. valuable transactions, beginning with Previously these organisations have had to make do with their fairly transparent use in enabling systems that offer lower levels of security or trust. secure socket layer (SSL) web sites. As an alternative to this in-house model, certain companies Certificates are also supported in all major offer a managed model by which the infrastructure is located centrally in a shared environment. This enables organisations web browsers, which is not the case for to relatively (but not substantially) reduce the costs and PGP keys and other alternatives, allowing complexity of implementing PKI. This approach, however, has had several problems over the years, including: easy client authentication. • The centralised location of sensitive data – bank customer identities • Loose integration with the backend systems of organisations So much so, that the majority of enterprises are now – making seamless identity and access management difficult preferring PKI over alternative solutions. Today, vendors such • Full dependence on an external organisation for security of as WISeKey offer highly secure PKI solutions that are cost sensitive activities efficient to both deploy and maintain. • Geopolitical concerns – many of the managed service providers operate out of the United States PKI solutions also bring benefits such as much broader operating system and application adoption. Certificates are the Some debate has taken place as to whether alternatives commonly accepted method for authenticating and protecting such as Pretty Good Privacy (PGP) are better than PKI. PGP valuable transactions, beginning with their fairly transparent and other alternatives have their benefits – a lower cost of use in enabling secure socket layer (SSL) web sites. deployment may sometimes be quoted as one of them. Certificates are also supported in all major web browsers, However, their drawbacks, such as requiring client software at which is not the case for PGP keys and other alternatives, the sender and recipient ends or not having the scalability of allowing easy client authentication. The same is true for secure PKI, tend to outweigh the benefits. devices such as smart cards and USB tokens. Low cost trusted security – myth or reality? | 11
  • 12. The World Internet Security Company Removing complexity, increasing trust – the WISeKey model WISeKey has been analysing the issues surrounding security The WISeKey model is unique in two ways: for many years. The company’s specialists have experience of highly sensitive environments – for example, they were 1) It offers a totally neutral trust model founded on its involved in first ever legally binding Internet voting system Swiss origins and its association with the Organisation – as well as highly complex environments with technologically Internationale pour la Securité des Transactions challenged infrastructures, such as in developing countries. Electroniques (OISTE) foundation WISeKey has built on the lessons learned and made the security, reliability, cost effectiveness and practicality of using 2) It brings PKI benefits to the mass market at an affordable PKIs a reality. As a result, WISeKey has put sophisticated PKI price by taking advantage of the PKI technology built-in to implementations within reach of organisations of any size, as Microsoft Windows Server software well as individuals. Trust neutrality With its headquarters in Switzerland, WISeKey operates laws, no private or government body can force the root key under Switzerland’s established political neutrality, security, to be divulged. This guarantees that all information and data confidentiality and efficiency laws. These are all essential en-crypted through OISTE/WISeKey certificates will remain requirements for the mass deployment of secure identity and secure. This approach is unique as no other infrastructure of access management infrastructures. its kind exists in such a high security environment, and the level of neutrality and protection afforded by stringent Swiss WISeKey acts as the business operator for OISTE root confidentiality and security laws is second to none. cryptographic keys. The OISTE Foundation is a non-profit international organisation based in Geneva, Switzerland. Founded in 1998, OISTE was created with the objectives of promoting the use and adoption of international standards to secure electronic transactions, expand the use of digital certification and ensure the interoperability of certification authorities’ e-transaction systems. The OISTE/WISeKey root is an offline root certificate for signing certification authorities and backed by OISTE. It is the basis for all other certificates issued through not just WISeKey solutions, but any other solutions accepted by the foundation, which are able to comply with the policies and practices that are applicable (see Figure 4). The OISTE/WISeKey root systems were created and maintained in a secure bunker Figure 4 – under the Swiss Alps recognised as one of the most secure The OISTE areas in the world today. Because of Swiss confidentiality trust model 12 | Low cost trusted security – myth or reality?
  • 13. PKI for everyone WISeKey recognised some of the challenges faced by large This approach also allows WISeKey to provide companies and small organisations in deploying PKIs. WISeKey has with the flexibility and scalability they need to satisfy their own been involved in large scale PKI projects with some or the requirements. Companies can choose to deploy a framework world’s largest private and public sector organisations. As hosted entirely within their own facility, or partner with WISeKey the company developed its expertise in managing these to implement a managed service hosted at WISeKey’s secure deployments, it was also quick to recognise where problems data centre. In essence, the approach taken by WISeKey can arose, and where costs could be controlled. provide certification services to a two to five person company all the way up to a national identity system, with very flexible As a result, WISeKey has developed a suite of products that forms of deployment, be it in-house, managed, ASP mode or a reduces complexity and costs at a stroke by enabling its series of other hybrid combinations of these. products to benefit from the digital certification technology already built in to the Windows Server platform. This suite also Individuals can benefit too. Employees within an organisation provides specialised, high-security components that extend can use the trusted electronic Identity (eID) not just in their and enhance the Microsoft technology into a full-scale industry business activities, but their personal lives too. If an individual strength PKI. wishes to create a personal eID, they can do so by using their company CA to validate their ID with WISeKey directly This approach means businesses of any size are able to and obtain an ID that is not linked to the company for which develop enterprise class security policies in the knowledge that they work. This provides a trusted eID, which they can use they can make full use of their existing technology investments wherever they are, and on any secure storage device that will to help put the policies into practice. be accepted across the internet for secure communications and transactions. Cost of a typical PKI implementation (set up, operation and maintenance) Exchange Active Directory SQL Server 2005 Public WebServer CertifyID Guardian DB CertifyID CRL Manager Reduction of costs and complexity SSL Certificate through a WISeKey implementation • Reduced technical complexity • Tighter integration into back end systems Certificate Authority CertifyID Blackbox • Reduced need for specialised staff CertifyID Guardian • Different licensing models • Implementation flexibility: in-house, managed, ASP, hybrids, and others = Figure 5 – WISeKey PKI implementation Low cost trusted security – myth or reality? | 13
  • 14. The World Internet Security Company Opportunities for a secure future More people than ever are using the internet to make Customers are becoming more sophisticated in their use purchases, manage finances and complete tax returns of online resources, and are sensitive about the privacy – to name but a few transactions. It is also true to say most and security of their data. When enterprises fail to take this consumers are suspicious of internet security. However, all the seriously and breaches occur, the speed at which these lapses signs show that despite the suspicion, people’s confidence in are communicated to others can be breathtaking. This can using the internet for these sorts of transactions is growing. create significant problems in retaining the trust of existing This evolution is also affecting businesses. Mobile devices customers and attracting new ones. Companies that look and the infrastructure required to support them is making a to harness security technologies with the aim of enhancing compelling business case for enterprises to change the way customer confidence, the relationship of trust, and ease of use they do business and companies of all sizes are quick to see they experience when managing transactions online, will gain a the competitive benefits in mobilising their operations. significant advantage over their competitors. Statutory requirements are difficult to predict because laws Successful companies are looking to IAM as a central change to reflect current social and economic realities. force in their strategy to manage these risks and realise As government regulations catch up with technology and the opportunities that increased security investments can requirements for compliance and reporting increase, the need produce. After many years of waiting, using PKI-based IAM to manage these processes over digital networks will increase. as a basis for secure communications is now becoming a Organisations that are able to monitor and authenticate their viable solution for organisations of all sizes, not just large transactions efficiently, and ensure that the privacy of the data corporations or government agencies. Enterprises should they hold is maintained will be better positioned to adjust to be looking at security and privacy as a business opportunity future requirements of this nature. to future-proof their regulatory compliance requirements, streamline their business operations and increase customer Similarly, it is difficult to predict who you will be doing business trust. Companies that regard it as a necessary evil – one with tomorrow, next month or next year. Your competitor that must be endured in order to minimise their own legal or today may become your trading partner tomorrow. Being able commercial liabilities – may find themselves outperformed by to collaborate and exchange information according to the more visionary competitors. requirements of a partnership could be crucial to success. Securing information access portals that facilitate this type of activity without risking exposure of company secrets to unauthorised parties will become ever more important. It could even make the difference between winning and losing a lucrative trading partnership. 14 | Low cost trusted security – myth or reality?
  • 15. Enterprises should be looking at security and privacy as a business opportunity to future-proof their regulatory compliance requirements, streamline their business operations and increase customer trust. Companies that regard it as a necessary evil – one that must be endured in order to minimise their own legal or commercial liabilities – may find themselves outperformed by more visionary competitors.
  • 16. The World Internet Security Company For more information on WISeKey WISeKey solutions please contact: WTC II info@wisekey.com route de Pré-Bois 29 P.O. Box 885 CH-1215 Geneva 15 Switzerland Or visit: www.wisekey.com Telephone: +41 22 594 3000