Enviar búsqueda
Cargar
Cidway Byod Authentication
•
0 recomendaciones
•
312 vistas
L
lfilliat
Seguir
BYOD - An opportunity for a truly secure mobile authentication solution
Leer menos
Leer más
Denunciar
Compartir
Denunciar
Compartir
1 de 14
Descargar ahora
Descargar para leer sin conexión
Recomendados
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
OKsystem
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
lfilliat
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
OKsystem
Overall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
JayHicks
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
OKsystem
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
USAID CEED II Project Moldova
Recomendados
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
OKsystem
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
lfilliat
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
OKsystem
Overall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
JayHicks
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
OKsystem
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
USAID CEED II Project Moldova
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
Jinhwan Shin
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
VCW Security Ltd
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
Ed Pimentel
Securing industrial and smart grid devices in a connected world webinar (final)
Securing industrial and smart grid devices in a connected world webinar (final)
gretchensimm
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
Veridium
Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012
Rafael Junquera
Banking the Unbanked
Banking the Unbanked
Veridium
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
wegdam
Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2
rpander
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
Veridium
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
watsongallery
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Hai Nguyen
Finacle Digital Commerce
Finacle Digital Commerce
Infosys Finacle
Mobile payment
Mobile payment
Software Park Thailand
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Veridium
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
Con8834 bring your own identity - final
Con8834 bring your own identity - final
OracleIDM
(Análise conteúdoentrevistafinal)
(Análise conteúdoentrevistafinal)
Debora Cunha
Más contenido relacionado
La actualidad más candente
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
Jinhwan Shin
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
VCW Security Ltd
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
Ed Pimentel
Securing industrial and smart grid devices in a connected world webinar (final)
Securing industrial and smart grid devices in a connected world webinar (final)
gretchensimm
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
Veridium
Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012
Rafael Junquera
Banking the Unbanked
Banking the Unbanked
Veridium
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
wegdam
Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2
rpander
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
Veridium
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
watsongallery
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Hai Nguyen
Finacle Digital Commerce
Finacle Digital Commerce
Infosys Finacle
Mobile payment
Mobile payment
Software Park Thailand
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Veridium
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
La actualidad más candente
(20)
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
Securing industrial and smart grid devices in a connected world webinar (final)
Securing industrial and smart grid devices in a connected world webinar (final)
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012
Banking the Unbanked
Banking the Unbanked
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Finacle Digital Commerce
Finacle Digital Commerce
Mobile payment
Mobile payment
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Destacado
Con8834 bring your own identity - final
Con8834 bring your own identity - final
OracleIDM
(Análise conteúdoentrevistafinal)
(Análise conteúdoentrevistafinal)
Debora Cunha
Javier Echevarría brief_september_2012
Javier Echevarría brief_september_2012
Opus Dei Nederland
Alg aula 04-2 - estruturas de-selecao tp1 (se - encadeado e caso)
Alg aula 04-2 - estruturas de-selecao tp1 (se - encadeado e caso)
Thalles Anderson
Com120 10 part 2
Com120 10 part 2
turnercom
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
Rob Douglas
Destacado
(6)
Con8834 bring your own identity - final
Con8834 bring your own identity - final
(Análise conteúdoentrevistafinal)
(Análise conteúdoentrevistafinal)
Javier Echevarría brief_september_2012
Javier Echevarría brief_september_2012
Alg aula 04-2 - estruturas de-selecao tp1 (se - encadeado e caso)
Alg aula 04-2 - estruturas de-selecao tp1 (se - encadeado e caso)
Com120 10 part 2
Com120 10 part 2
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
Similar a Cidway Byod Authentication
Cidway Banking 02 2011
Cidway Banking 02 2011
lfilliat
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
lfilliat
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
lfilliat
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
Optimising mobile signature v4
Optimising mobile signature v4
moldovaictsummit
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
Assurity seminar 24 jan
Assurity seminar 24 jan
Jason Kong
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
MMT Dubai presentation by Mr. Deepak Chandnani, CEO, Obopay
MMT Dubai presentation by Mr. Deepak Chandnani, CEO, Obopay
Obopay
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
Shelf Companies Aust
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
Open Data Business
Open Data Business
Semantic Web Company
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
Archana833240
ekey+ Presentation
ekey+ Presentation
Creus Moreira Carlos
FrontOne our new and different solutions
FrontOne our new and different solutions
frontone
User Authentication for Government
User Authentication for Government
Carahsoft
Criticality of identity
Criticality of identity
Nordic APIs
Code objects overview sep 2012
Code objects overview sep 2012
steveramsthel
Similar a Cidway Byod Authentication
(20)
Cidway Banking 02 2011
Cidway Banking 02 2011
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Optimising mobile signature v4
Optimising mobile signature v4
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication - Business Considerations
Assurity seminar 24 jan
Assurity seminar 24 jan
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
MMT Dubai presentation by Mr. Deepak Chandnani, CEO, Obopay
MMT Dubai presentation by Mr. Deepak Chandnani, CEO, Obopay
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
Open Data Business
Open Data Business
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
ekey+ Presentation
ekey+ Presentation
FrontOne our new and different solutions
FrontOne our new and different solutions
User Authentication for Government
User Authentication for Government
Criticality of identity
Criticality of identity
Code objects overview sep 2012
Code objects overview sep 2012
Cidway Byod Authentication
1.
BRING YOUR OWN
DEVICE non intrusive security solution Swiss Consulting Association – 26.09.2012 by: Laurent FILLIAT Discover the future of security on www.cidway.com
2.
Agenda
² Cidway OK Security SA ² BYOD: a reality companies have to face ² BYOD: Corporate Strategy ² BYOD: key questions to de addressed ² BYOD Use case 1: Mobile Authentication ² BYOD Use Case 2: Mobile Launcher ² BYOD 2.0 © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 2
3.
CIDWAY – Background
Cidway Partners and Customer Services ² Created in December 2005 ² Global presence via partners & resellers ² Head Quarters in Lausanne, CH ² Support center for Partners ² Sales Offices (CH, UK, MENA, LATAM) ² Support portal available for partners ² Internal R&D & Patent Office ² Consulting services CIDWAY’s Vision Authentication and transactions should be safe, reliable and easy for anyone, anywhere, anytime This vision is fuelled by: ü Meeting virtually all authentication requirements ü Making Authentication & Transactions simple, easy, accessible, secure and user friendly ü Addressing virtually unlimited vertical applications from one platform © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 3
4.
Cidway Business Solutions
Consumer Homeland OEM Corporate access Health Care (Original Equipment Security Security Manufacturers) • e/m-Banking • Corporate resource • Pilots authen-ca-on • Access to medical • Handset access Manufacturers • e/m-Commerce • Transporta-on records • VPN access control • Mobile • e/m- security Government • WiFi HotSpot access • Process control Application • e/m-Brokerage • Application Access • Two ways • Document signature Providers • e/m-Health care • Mobility authen-ca-on corroboration • Network • Document signature Providers • e/m-Gaming corroboration • Financial • e/m-Lottery Institutions • e/m-Loyalty • e/m-Payment © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 4
5.
Cidway GAIA /
SESAMI Product Line One server for multiple tokens Yubikey Display Cards SESAMI Mobile HARDWARE Tokens Time based OTP/TDS Software token Convergence of physical & KeyFob for mobile phones. logical access GAIA Server Authentication platform OATH compliant GAIA SDK Authentication platform SDK SESAMI Mobile SDK SESAMI SMS Time based OTP/TDS mobileSDK SMS based OTP for mobile phones for mobile phones SDK: Software Development Kit © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 5
6.
Bring Your Own
Device
7.
BYOD – a
reality companies have to face According to Forrester (2011), 70% of smartphones belong to users, 12% are chosen from an approved list, and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a list, and 16% are corporate issued. Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted. Further, a Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016. © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 7
8.
BYOD: A matter
of Corporate Strategy Not allowed Agreed Policies Totally open & EMM solutions © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 8
9.
BYOD: Key questions
to be addressed • Finance: Who pays what (data plan, communications, etc.) • Compliance: What regulations govern the data your organization needs to protect? For instance, the Health Insurance Portability and Accountability Act (HIPAA) requires native encryption on any device that holds data subject to the act. • Security: What security measures are needed (passcode protection, jailbroken/ rooted devices, anti-malware apps, encryption, device restrictions, iCloud backup)? • Applications: What apps are forbidden? IP scanning, data sharing, Dropbox? • Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with corporate data? • Services: What kinds of resources can employees access—email? Certain wireless networks or VPNs? CRM? • Privacy: What data is collected from employees’ devices? What personal data is never collected? • Legal: who’s responsible in case of loss, stolen device Create the Policy before procuring Technology © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 9
10.
BYOD Use Case
1: an opportunity for Authentication OK Shift cumbersome and expensive hardware to the Mobile © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 10
11.
BYOD: Key questions
to be addressed… • Finance: No additional costs to the Employee; Cheaper for Corporate • Compliance: Compliant with most of regulations (some solutions). • Security: Only few solutions have the appropriate level of security • Applications: Application to be allowed • Agreements: Idem as with hardware tokens • Services: Self-service deployment, low level of support (compared to hardware) • Privacy: Does not interfere with, nor collect any data on the device • Legal: Idem as hardware tokens • Not Intrusive: a simple application, not requiring a container, no interference with personal data, no risk of communications, does not take control of the device… © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 11
12.
FAQ on Mobile
Authentication Sesami Mobile is the answer • What are the risks if I loose my phone ? • What are the risks to download a fake application from a mobile public store ? • How easy is it to activate the application and what are the risks during the process ? OK • Do I need connectivity to Authenticate ? • What are the risks of brute force, man in the middle and other sophisticated attacks ? • Did the application pass penetration tests ? • What are the coding techniques to guarantee top security ? • Are they credentials transmitted over the air ? What are the risks ? • Is it time based ? Challenge response ? • What happens when the user change the time zone or the phone clock changes ? • Does it work on all Mobile platforms ? • Is it possible to customize the application ? • Can we use the Authentication application within another Mobile solution for example for Mobile Banking ? • Is the solution already deployed and used for Mobile authentication and Mobile Transactions ? • Does the solution considered supports real time-based OTP, mutual-authentication & transaction signature ? © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 12
13.
BYOD Use Case
2: Protect Data Access not the Device CIO Magazine Online: Mobile device management (MDM) products and services are often the reflexive response to the need for more secure mobile computing, but in many ways that's like using a chainsaw rather than a scalpel to perform surgery. A growing number of secure mobile solution providers say the answer to BYOD is not to control the device, but to control the data access. SALES REPORTS Strong Authentication secured by Mutual Authentication (time-based OTP) Web-based Cidway Mobile Mobile Application Launcher (BI, email, Non-intrusive No-Pin protection Reports, etc.) Secure virtual keyboard Jailbrake/Root detection Data encryption © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 13
14.
BOYD 2.0
BUY YOUR OWN DEVIVCE ZDNet: Des salariés tenus d’acheter leurs terminaux pour leur activité professionnelle, c’est la phase 2 du BYOD envisagée, pour des raisons d'économies, par des directions financières. Une telle perspective pose de nombreuses questions techniques, mais aussi et surtout en termes juridiques et RH. © 2012 CIDWAY Security SA. All rights reserved – www.cidway.com 14
Descargar ahora