Identity Security Time to Share

1 / 22
About This Presentation
Title:

Identity Security Time to Share

Description:

Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session ... – PowerPoint PPT presentation

Number of Views:1
Avg rating:3.0/5.0
Slides: 23
Provided by: Solu3

less

Transcript and Presenter's Notes

Title: Identity Security Time to Share


1
Identity SecurityTime to Share
  • Nicolas PoppVeriSignMM/DD/YY - Session Code 22
    pt Arial

2
Identity SecurityTime to Share
  • Nicolas PoppVeriSignMM/DD/YY - Session Code 22
    pt Arial

3
The Internet Is Real and Global
Source Morgan Stanley
4
Yet, Its Only the Beginning
Digital ()
Total
1.3
Media Entertainment
1.3t
5.5
2005
VoIP Access Lines
180m Lines
4.5
Supply Chain
17.8b
6.0
381.7b
Advertising
2005
8.0
2.2t
Retail Commerce
14.1
Internet
6.4b Total Population
2005
29.4
7.1b Total Lines
Wireless
Sources 2006 Forrester, PwC, IDC, In-Stat,
eMarketer, TIA and VeriSign
5
What Could Go Wrong?
Meet Wicked Rose
Young Methodical Global for Hire!
6
The Internet Makes It Easier to Steal
7
Consumers Make It Harder to Secure
More convenienceLess Security!
8
The Good Guys Are Not Working Together
  • Geo-Political Boundaries
  • Identity Silos
  • Point Solutions
  • Global Threat
  • Target Rich Environment
  • Multi-Faceted Attacks

9
Meanwhile, The Bad Guys Are Innovating
WEB (Google Adwords Phishing)
EMAIL (Pump and Dump)
DESKTOP (MetaFisher Bot)
10
Operating Intelligent and Global Infrastructures
  • Professional grad command center
  • Controls bots across the world and allows
    targeted attacks
  • Infrastructure can be rented by the hour!

11
Running Well-Oiled Businesses
Discount Pricing
Online Marketplace
Money Mules
12
And Theyre Coming After You!
  • ID Theft Rapidly Growing
  • 10M Adults victimized
  • 15B in total losses
  • 50 Million accounts compromised
  • 25 Year to year Growth

13
Raising the Identity Security Bar
The Four Pillars of Successful Identity Security
Solutions
1. CONVENIENT
2. GLOBAL
  • The security that we introduce must not disrupt
    the convenience of the Internet
  • We need to move away from point solution and
    apply a global infrastructure approach

4. COLLABORATIVE
3. COMPREHENSIVE
  • Bad guys always move to the weakest link. The
    user, the desktop, site front-end and backend
    must be strengthened
  • No one can do it alone. The industry needs to
    take a collaborate and fraud intelligence must be
    shared across boundaries

14
Anyone Would Dare Trying?
  • Critical internet infrastructure operator (DNS
    and SSL)
  • Recognized and trusted by millions of Internet
    users
  • Security provider to financial institutions and
    online merchants

15
Introducing VeriSign Identity Protection (VIP)
Intelligent Infrastructure for ID Protection
VIP Authentication
VIP Fraud Detection
VIP Network
Two complementary services enhanced by a Network
Effect
16
An Idea Inspired by the Offline World
  • An ATM card works across all the Banks on the
    Cirrus Network
  • An ATM card works across all the Banks on the
    Cirrus Network
  • A VIP Device Works Across all the Web sites on
    the VIP Network

Need fraud intell sharing
17
A Demo Speaks More than Thousand Words
  1. Convenient
  2. Comprehensive
  3. Global
  4. Collaborative

Identity Protection Infrastructure
18
Global and Sharing Communities
3M Accounts
100M Accounts
200M Users
181M Registered
Shared VIP Authentication Network
19
Industry Collaboration
20
Conclusion It Is Time to Share!
  • Fraud and the fear of fraud are significant
    long-term threats to Internet growth
  • News solutions must emerge that are adapted to
    the challenge
  • Consumer-centric
  • Layered defense
  • Global approach
  • The identity silos and the industry must come
    together

21
Identity SecurityTime to Share
  • Nicolas PoppVeriSignMM/DD/YY - Session Code 22
    pt Arial

22
Identity SecurityTime to Share
  • Nicolas PoppVeriSignMM/DD/YY - Session Code 22
    pt Arial
Write a Comment
User Comments (0)