Title: Secure Access' Every User' Every Time'
1Secure Access. Every User. Every Time.
2Why Strong Authentication?
Passwords alone are just not enough!
3Enterprise Strong Authentication Large
Addressable Market
Local Authentication Users - 270M
360M WW Knowledge Workers
Remote Access Users 90M
IDC remote access market, year-over-year growth
rate of 34 through 2010
4Enterprise Authentication Market Trends
VPN
Regulatory Mandate
Remote Mail (OWA)
Security-Market Drivers
Portal (Sharepoint)
Single Sign-on
Early Adopters
SaaS (Salesforce)
Local Authentication
Low
High
Number of Users
5The Challenge Securing Access Points
Local Authentication Remote Access
Authentication Web-Based Authentication Offl
ine
Credentials
Applications
- 75 of fraud occurs internally - Password
Sharing and Fraudulent Access - Proactively protect access to confidential
data and strengthen Enterprise Single
Sign-On (ESSO) access
Local Network Access (PC / Thin Client)
BP Auth Software
VPN
- Reduce fraud attempts from outside the
network perimeter - Comply with 2-factor mandates for remote
access (e.g. PCI)
VPN Appliance
Offline (PC / Laptop)
Internet
- Protect access to internal web applications
(Financials, Patient Data, etc.) - Protect access to customer and partner facing
web applications / portals
Remote Access
Web Based Applications
- Strong Authentication when disconnected from
network
5
6The State of Strong Authentication Today
What you know
Knowledge Based (KBA)
Challenge / Response
Tokens / Cards
Verifies information from/about the user
But
- Susceptible to social engineering attack
- Hard to remember even more information
7BioPasswords Unique Biometric Software
Advantages
Biometric Authentication
- Accurately verifies the user
- Requires no change in user behavior
Keystroke Dynamics (KD)
Keystroke Biometrics
- Requires no special hardware to manage or
distribute
- Easily deploys across the enterprise or the
Internet
- Rhythm cannot be shared, lost, stolen or forgotten
Biometric solution based on repetitive
pattern of typing on a keyboard
8 BioPassword - Over 99 Accurate
- Imposters rejected 99.2 despite holding correct
password - Legitimate users granted access 98 without need
for backup authentication method - http//www.tolly.com/DocDetail.aspx?DocNumber2072
33
9Complementary Authentication Options
Multiple factors to deliver high security
for all access methods every time
Authentication Options
KBA/OTP with BioPassword
10BioPassword Best Authentication Option
High
AuthenticationCurve
High Cost/ High Security
Low Cost/ High Security
Strong Authentication Software
PhysicalBiometrics
Tokens/ Smart Cards
What you are
- Keystroke biometrics
- Knowledge based authentication
- Software OTP
FingerprintScanner
What you have
Software OTP
What you know
Level of Security
ComputerProfiling
Knowledge Based Authentication
StrongPasswords
WeakPasswords
Low Cost/ Low Security
Low
High Cost/ Low Security
Low (Best)
Cost of Ownership
High (Worst)
11BioPassword Solution Breadth of Coverage
Enterprise Edition
Internet Edition
Authentication Server(s)
Local PC
LocalThinClient
Applications
Enterprise
BP Auth Software
Enterprise SSO
Citrix
Web
Internet
Offline PC
Internet
Customer Facing Applications
Outlook Web AccessCitrix Web Interface
Intranet/Portal Applications
Remote Access (VPN) Citrix Access
Gateway Juniper F5
11
12BioPassword - Citrix Ready Integration
13Select BioPassword Customers
- Global
- Toyota
- Morgan Stanley
- Walt Disney
- First Data
- Fiserv
- Dominos
- Europe
- ARE Local Authority
- Citec
- LaFarge
Not for External Publication
14Select BioPassword Customers
Customers in
14
15See it in action
1605 NW Sammamish RoadIssaquah, WA 98027
Mark Upson President and CEO
marku_at_biopassword.com
15
16Why Strong Authentication?
Passwords alone are just not enough!
17Most troubling
By the end of 2007, 75 of enterprises will be
infected with undetected, financially motivated,
targeted malware that evaded their traditional
perimeter and host defenses. The threat
environment is changing financially motivated,
targeted attacks are increasing, and automated
malware-generation kits allow simple creation of
thousands of variants quickly but our security
processes and technologies haven't kept
up. Gartner's Top Predictions for IT
Organizations and users, 2007 and Beyond
18Select Customers
Customers in
Select Customers
18
19BioPassword Enterprise Edition for Citrix
Environments
- Access Gateway VPNs for Remote Access
- Password Manager for Single Sign-On
- Presentation Server Applications