SlideShare una empresa de Scribd logo
1 de 15
mIDentity 3G Stay connected. Be secure. Be free. mIDentity 3G effortless end-point Security
Experience that can be trusted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
m ID entity 3G Effortless End Point Security.
What is mIDentity 3G? High speed, secure network access Encrypted store Zero Footprint launch of application (e.g. Browser) and communications stack Separate SmartCard for PKI applications Policy based management enforced inside the device Remote management platform A  Secure Mobile Communications Platform  allowing confidential access to highly sensitive information, centrally managed and locally executed
m ID entity® 3G – flexible application scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Custom Applications - Guaranteed point to point encryption meeting the highest security expectations Be secure Stay connected
u CAN ®  Connect: Connection Manager
mIDentity 3G Technology H A R D W A R E  L A Y E R Hardened  Firefox-Browser Complete Java RTE CD-ROM image Secure Update client Middleware S O F T W A R E  L A Y E R smart card Smart card reader No installation on MacOS, Linux  and Windows USB form factor  and Plug & Play What you see is what you sign (WYSIWYS) KICKSTART  Technology
onboard applications  Software  Layer Hardware  Layer Smartcard Reader Smartcard USB Form Factor device No  Software- or  Driver Installation! Java Applet or  Browser Plug-in Card PKCS#11 Hardened browser local PC mIDentity 3G Update Client
mIDentity 3G smart security management
One concept makes the difference ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G – specific and individual solution for the customer Option Kobil Systems Integrator Operator Customer
One mutual solution – A benefit to both ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Operator
One joint solution – Benefits for three ,[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Systems Integrator Operator
One joint solution – Benefits for all ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Systems Integrator Operator Customer
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],mIDentity 3G
Thank you! Let’s create the future together!

Más contenido relacionado

La actualidad más candente

Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital VaultBlock Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuityBlock Armour
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...Block Armour
 

La actualidad más candente (20)

Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
IoT security
IoT securityIoT security
IoT security
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
IoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and VulnerabilitiesIoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and Vulnerabilities
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 

Destacado

Keynote Disco 15 - Learning
Keynote Disco 15 - LearningKeynote Disco 15 - Learning
Keynote Disco 15 - LearningSigi Jakob-Kuehn
 
Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Sigi Jakob-Kuehn
 
Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15Sigi Jakob-Kuehn
 
Learning together with Moodle and Mahara
Learning together with Moodle and MaharaLearning together with Moodle and Mahara
Learning together with Moodle and MaharaSigi Jakob-Kuehn
 
Präsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchenPräsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchenSigi Jakob-Kuehn
 
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)Sigi Jakob-Kuehn
 
Logarismes
LogarismesLogarismes
Logarismesslidario
 
Fongs Killer
Fongs KillerFongs Killer
Fongs Killerslidario
 
Amarula in Canada
Amarula in CanadaAmarula in Canada
Amarula in CanadaEncrypted
 
Soc 03 Perriman Alyson
Soc 03 Perriman AlysonSoc 03 Perriman Alyson
Soc 03 Perriman Alysonperrimana1
 
Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01hdeknijff
 
Are you Environmentalist?
Are you Environmentalist?Are you Environmentalist?
Are you Environmentalist?Encrypted
 
H&M in Canada
H&M in CanadaH&M in Canada
H&M in CanadaEncrypted
 
Valentine\'s Day
Valentine\'s DayValentine\'s Day
Valentine\'s DayEncrypted
 

Destacado (18)

Option Overview
Option OverviewOption Overview
Option Overview
 
Keynote Disco 15 - Learning
Keynote Disco 15 - LearningKeynote Disco 15 - Learning
Keynote Disco 15 - Learning
 
Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011
 
Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15
 
Learning together with Moodle and Mahara
Learning together with Moodle and MaharaLearning together with Moodle and Mahara
Learning together with Moodle and Mahara
 
Präsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchenPräsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchen
 
Conditional
ConditionalConditional
Conditional
 
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
 
Logarismes
LogarismesLogarismes
Logarismes
 
Fongs Killer
Fongs KillerFongs Killer
Fongs Killer
 
16.02.08
16.02.0816.02.08
16.02.08
 
Negotiation
NegotiationNegotiation
Negotiation
 
Amarula in Canada
Amarula in CanadaAmarula in Canada
Amarula in Canada
 
Soc 03 Perriman Alyson
Soc 03 Perriman AlysonSoc 03 Perriman Alyson
Soc 03 Perriman Alyson
 
Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01
 
Are you Environmentalist?
Are you Environmentalist?Are you Environmentalist?
Are you Environmentalist?
 
H&M in Canada
H&M in CanadaH&M in Canada
H&M in Canada
 
Valentine\'s Day
Valentine\'s DayValentine\'s Day
Valentine\'s Day
 

Similar a M I Dentity 3 G 040111

The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...FaberLab
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosXylos
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationInnodisk Corporation
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 

Similar a M I Dentity 3 G 040111 (20)

The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component Integration
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 

M I Dentity 3 G 040111

  • 1. mIDentity 3G Stay connected. Be secure. Be free. mIDentity 3G effortless end-point Security
  • 2.
  • 3. m ID entity 3G Effortless End Point Security.
  • 4. What is mIDentity 3G? High speed, secure network access Encrypted store Zero Footprint launch of application (e.g. Browser) and communications stack Separate SmartCard for PKI applications Policy based management enforced inside the device Remote management platform A Secure Mobile Communications Platform allowing confidential access to highly sensitive information, centrally managed and locally executed
  • 5.
  • 6. u CAN ® Connect: Connection Manager
  • 7. mIDentity 3G Technology H A R D W A R E L A Y E R Hardened Firefox-Browser Complete Java RTE CD-ROM image Secure Update client Middleware S O F T W A R E L A Y E R smart card Smart card reader No installation on MacOS, Linux and Windows USB form factor and Plug & Play What you see is what you sign (WYSIWYS) KICKSTART Technology
  • 8. onboard applications Software Layer Hardware Layer Smartcard Reader Smartcard USB Form Factor device No Software- or Driver Installation! Java Applet or Browser Plug-in Card PKCS#11 Hardened browser local PC mIDentity 3G Update Client
  • 9. mIDentity 3G smart security management
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Thank you! Let’s create the future together!