Secure Access' Every User' Every Time' - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Secure Access' Every User' Every Time'

Description:

People are deceived into giving them up. People share passwords with friends. People use software to steal them. People watch other ... Most troubling ... – PowerPoint PPT presentation

Number of Views:58
Avg rating:3.0/5.0
Slides: 19
Provided by: paula244
Category:

less

Transcript and Presenter's Notes

Title: Secure Access' Every User' Every Time'


1
Secure Access. Every User. Every Time.
2
Why Strong Authentication?
Passwords alone are just not enough!
3
Enterprise Strong Authentication Large
Addressable Market
Local Authentication Users - 270M
360M WW Knowledge Workers
Remote Access Users 90M
IDC remote access market, year-over-year growth
rate of 34 through 2010
4
Enterprise Authentication Market Trends
VPN
Regulatory Mandate
Remote Mail (OWA)
Security-Market Drivers
Portal (Sharepoint)
Single Sign-on
Early Adopters
SaaS (Salesforce)
Local Authentication
Low
High
Number of Users
5
The Challenge Securing Access Points
Local Authentication Remote Access
Authentication Web-Based Authentication Offl
ine
Credentials
Applications
  • 75 of fraud occurs internally - Password
    Sharing and Fraudulent Access
  • Proactively protect access to confidential
    data and strengthen Enterprise Single
    Sign-On (ESSO) access

Local Network Access (PC / Thin Client)
BP Auth Software
VPN
  • Reduce fraud attempts from outside the
    network perimeter
  • Comply with 2-factor mandates for remote
    access (e.g. PCI)

VPN Appliance
Offline (PC / Laptop)
Internet
  • Protect access to internal web applications
    (Financials, Patient Data, etc.)
  • Protect access to customer and partner facing
    web applications / portals

Remote Access
Web Based Applications
  • Strong Authentication when disconnected from
    network

5
6
The State of Strong Authentication Today
What you know
Knowledge Based (KBA)
Challenge / Response
Tokens / Cards
Verifies information from/about the user
But
  • Susceptible to social engineering attack
  • Hard to remember even more information

7
BioPasswords Unique Biometric Software
Advantages
Biometric Authentication
  • Accurately verifies the user
  • Requires no change in user behavior

Keystroke Dynamics (KD)
Keystroke Biometrics
  • Requires no special hardware to manage or
    distribute
  • Easily deploys across the enterprise or the
    Internet
  • Rhythm cannot be shared, lost, stolen or forgotten

Biometric solution based on repetitive
pattern of typing on a keyboard
8
BioPassword - Over 99 Accurate
  • Imposters rejected 99.2 despite holding correct
    password
  • Legitimate users granted access 98 without need
    for backup authentication method
  • http//www.tolly.com/DocDetail.aspx?DocNumber2072
    33

9
Complementary Authentication Options
Multiple factors to deliver high security
for all access methods every time
Authentication Options
KBA/OTP with BioPassword
10
BioPassword Best Authentication Option
High
AuthenticationCurve
High Cost/ High Security
Low Cost/ High Security
Strong Authentication Software
PhysicalBiometrics
Tokens/ Smart Cards
What you are
  • Keystroke biometrics
  • Knowledge based authentication
  • Software OTP

FingerprintScanner
What you have
Software OTP
What you know
Level of Security
ComputerProfiling
Knowledge Based Authentication
StrongPasswords
WeakPasswords
Low Cost/ Low Security
Low
High Cost/ Low Security
Low (Best)
Cost of Ownership
High (Worst)
11
BioPassword Solution Breadth of Coverage
Enterprise Edition
Internet Edition
Authentication Server(s)
Local PC
LocalThinClient
Applications
Enterprise
BP Auth Software
Enterprise SSO
Citrix
Web
Internet
Offline PC
Internet
Customer Facing Applications
Outlook Web AccessCitrix Web Interface
Intranet/Portal Applications
Remote Access (VPN) Citrix Access
Gateway Juniper F5
11
12
BioPassword - Citrix Ready Integration
13
Select BioPassword Customers
  • Global
  • Toyota
  • Morgan Stanley
  • Walt Disney
  • First Data
  • Fiserv
  • Dominos
  • Europe
  • ARE Local Authority
  • Citec
  • LaFarge

Not for External Publication
14
Select BioPassword Customers
Customers in
14
15
See it in action
1605 NW Sammamish RoadIssaquah, WA 98027
Mark Upson President and CEO
marku_at_biopassword.com
15
16
Why Strong Authentication?
Passwords alone are just not enough!
17
Most troubling
By the end of 2007, 75 of enterprises will be
infected with undetected, financially motivated,
targeted malware that evaded their traditional
perimeter and host defenses. The threat
environment is changing financially motivated,
targeted attacks are increasing, and automated
malware-generation kits allow simple creation of
thousands of variants quickly but our security
processes and technologies haven't kept
up. Gartner's Top Predictions for IT
Organizations and users, 2007 and Beyond
18
Select Customers
Customers in
Select Customers
18
19
BioPassword Enterprise Edition for Citrix
Environments
  • Access Gateway VPNs for Remote Access
  • Password Manager for Single Sign-On
  • Presentation Server Applications
Write a Comment
User Comments (0)
About PowerShow.com