1 / 23

HyperID

HyperID. Eli Keren Vice President of Sales and Marketing 2012. What is Two Factor Authentication?. Two-factor authentication is often confused with other forms of authentication. Two factor authentication implies the use of two independent means of evidence to

dena
Download Presentation

HyperID

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HyperID Eli Keren Vice President of Sales and Marketing 2012

  2. What is Two Factor Authentication? Two-factor authentication is often confused with other forms of authentication. Two factor authentication implies the use of two independent means of evidence to assert an entity, rather than two iterations of the same means. "Something one knows", "something one has", and "something one is" are useful simple summaries of three independent factors. In detail, these factors are: what the requestor individually knows as a secret, such as a password, or a Personal Identification Number (PIN) what the requesting owner uniquely has, such as a passport, physical token, or ID-card. what the requesting bearer individuallyis, represented by biometric data such as a fingerprint or face geometry, or a retina or iris scan.

  3. What is One Time Password (OTP)? One-time password (OTP) is a security system that requires a new password every time when a user authenticates themselves, thus protecting against an intruder replaying an intercepted password. The Secret A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that, if a potential intruder manages to record an OTP that was already used to log into a service or to conduct a transaction, he or she will not be able to abuse it since it will be no longer valid. On the downside, OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work.

  4. Methods of OTP • eMail and WEB • SMS and VOICE to Cell phones Independent Tokens:

  5. Usages and applications of OTP VPN remote access credentials Financial transaction authentication WEB access and identification Secure network login Physical access login Government services validation and identification

  6. Why SMS OTP is better over Tokens? Vs. No additional HW device to carry Most every one has an SMS capable cellular phone Large scale management enabled Large scale proliferation is enabled HW management of tokens is a challenge Replacement of token in remote locations is problematic, with SMS phone, only a SIM card replacement Cost of SMS license as initial cost is substantially cheaper If SMS is sent via VPN – no cost of SMS

  7. Why VOICE OTP is even better over Tokens? Vs. No additional HW device to carry Most every one has a cellular phone Immediate reception – no wait time Large scale management enabled Large scale proliferation is enabled HW management of tokens is a challenge Replacement of token in remote locations is problematic, with SMS phone, only a SIM card replacement Cost of Voice OTP license as initial cost is substantially cheaper If call is via VPN – no cost of the call Adheres to US Gov. regulation for the handicapped (L4)

  8. Why SMS or VOICE OTP with CPE? Data base security and integrity ROI is short terms Vs. ongoing cost from aggregators If calls or SMS are done on organizational VPN – no cost In most cases SMS or VOICE calls via cloud services are expensive Reports and statistics API – the ability to quickly develop new services and abilities

  9. HyperID All in One Two Factor Authentication OTP system • Customer Premises Equipment for better • security and database integrity

  10. What is HyperID™ Appliance? • A stand alone, in-premises device, providing all Out-Of-Band (OOB) One-Time-Password (OTP) transmission facilities and services for Two Factor Authentication applications • Via SMS • Via VR voice call • Vasco OTP technology • Vasco Indentikey Ready

  11. About Vasco VASCO is a world leader in strong authentication and e-signature solutions, specializing in online accounts, identities and transactions. As a global software company, VASCO serves a customer base of approximately 10,000 companies in over 100 countries, including more than 1,700 international financial institutions. In addition to the financial sector, VASCO's technologies secure sensitive information and transactions for the enterprise security, e-commerce and e-government industries

  12. Why HyperID™ Appliance? - New Market Opportunities Solution for Small and Medium Business Extra Security • Customer Premises Equipment (CPE) enhances security • Reduced security breach threats (no need for aggregators) • All-In-One - OTP Generating, Broadcasting and Authenticating • SMS • Voice • email • Plug-It and Be-Identified • Off-the-shelf product • Short term ROI

  13. Why HyperID™ Appliance? - New Market Opportunities Telecom Approach • Telecom grade equipment Vs. IT grade equipment • OTP over voice - added IVR capabilities • Reduced latency - voice calls are faster and secure • Reliability and redundancy – Multi-Channels OTP Delivery; GSM, PSTN, VoIP, SMS, Data and e-mail • Two way SMS, voice and Smart Phones Apps. (Data) Better Customer Approach • Support for the hearing and sight impaired - Voice and SMS • Choose your OTP delivery carriers based on tariffs and destinations • Increased customer loyalty and reduced churn

  14. Why HyperID™ Appliance? - Better Identification Management • No need for external IP connection • Secure SIM cards in a central location • Central SMS management • Prepaid cards support – no contracts Autonomous Compliance • US government Level 3/4 compliance • No reliance on IP connectivity • No dependency on single telecom carrier • No dependency on cloud services • Serves your own need, in-house

  15. HyperID™ – Hardware Platform Two size chassis: 3U & 6U Modular Scalable IDENTIKEY ready Web Management and Control

  16. HyperID™ – Multi-Channels Support LAN / WANRadius PSTN VoIP e-Mail Voice GSM SMS DATA Secure Access Entity HyperID OTP Appliance • Cellular: GSM/3G • 4 to 12 Cellular Ports - 3U • 8 to 32 Cellular Ports - 6U • Land Line • E1/T1 (PRI) / NT/TE (BRI) • VoIP Connectivity • SIP • H.323 • SMS • In-bound and Out-Bound • IMR • Voice • Two-Ways Voice • IVR • Build-In DTMF Recognition

  17. HyperID™ - OTP Transmission Management LAN / WANRadius e-Mail Voice e-Mail Voice WAN DATA SMS SMS DATA Site 1 - Master HyperID OTP Appliance HyperID OTP Appliance Site N - Slave Secure Access Entity Master-slave topology for centralized management Cellular signal quality and availability End user receiving devices Target destination and location Cost and tariffs planning

  18. HyperID™ - Full OTP Redundancy Plan or DRP e-Mail Voice IVR Data SMS OTP Text Format HyperID OTP Voice Format OTP App. client OTP Mail Format Multi-site deployment Auto-carrier and provider selection - Cellular, PSTN, VoIP, Mail Multi-channels support - Voice (IVR), SMS, Data and e-Mail SIM server - centralized SIM management

  19. Network Topology # 2 - 2FA OTP Appliance HyperID™ OTP Transmission Voice – SMS - eMail 2FA - OTP server 2FA OOB OTP Appliance

  20. Customer case studies

  21. Application: Two-factor authentication

  22. Application: Two-factor authenticationBanking and Financial services

  23. Thank you

More Related