220 likes | 382 Views
An Introduction to CRYPTOCard Date. Presented by:- A Sales person. At a glance. CRYPTOCard delivers Authentication to secure digital identities We deliver via traditional server & unique SaaS models Broad industry use and dominant in key sectors
E N D
An Introduction to CRYPTOCard Date Presented by:- A Sales person
At a glance • CRYPTOCard delivers Authentication to secure digital identities • We deliver via traditional server & unique SaaS models • Broad industry use and dominant in key sectors • In the UK we have 24% share in Local Government • B2B focussed • Our biggest customers have 50,000 – 150,000 seats • Our points of difference are: • SaaS model • Focus on automation of provisioning and integration • Token quality and range • Low TCO CRYPTOCard – The Authority in Securing Digital Identities
CRYPTOCard: A history of innovation 4 KT-1Key chain introduced Company founded BlackShield IDintroduced CRYPTO-MASintroduced KT-4 Key chain introduced SMS Tokenintroduced Java Token launched Blackberrytoken introduced RB-1 token introduced Grid Token launched SC-1 Smart Card introduced UB-1 USB Token introduced AuthEngineintroduced InnovativeProduct of 2008 Best of Show MacWorld Linux version introduced Harrodsbecame customer Bombardierbecame customer Applebecame customer NASA - our first major customer BMW became customer CMS-CMSKbecame a customer Comic Reliefbecame a customer Yorkshire Building Society became a Customer Isle of Wightbecame a Customer World’s first Mac authentication solution introduced
Our Geographic Spread Coverage and sales in over 70 countries for thousands of companies North America EMEA R o W A competitive market in which we have established our largest customers KEY FACTS:- Locations: Ottawa Focus:- Engineering, Operations, Support, Finance, Strong growth over past 2 years and massive potential for the future KEY FACTS:- Locations: Bristol, Bracknell, Eindhoven Focus:- Sales, Marketing, Support A tactical market for the next 2 years KEY FACTS:- Continuous production facility in China
Written down Easy to crack Easy to guess Difficult to audit Hard to remember Easy to steal Expensive to manage The problem with passwords Passwords are the weakest link in the security chain:Nearly every successful Hacking, Phishing or ID theft attempt involves obtaining a password
The password gremlins Many customers have secured their internal network, using managed services to deliver Anti-virus, Firewalls, Content Filtering, Anti-Spam, Anti-Spyware... BUT......... Workstations Branch Offices Your people PDA Users Database server DMZ Access Router Firewall PBX / Phone System Network Server Mobile Staff Your customers Wireless Workstations Remote Users 3rd Party Access ....... very few businesses realise that their cloud-based services and remote access networks are a risk – because they are only secured by a static password
Market opportunity for Authentication Increasing take-up of cloud based services and desire for on-line collaboration tools increase the need for password replacement solutions Longer term:- Authentication as part of an integrated workflow Move to federated ID world using SAML and other open standards Rate of Deployment Banking Customer Access Consumers Partners Cloud based and on-line services, web based collaboration solutions Market Penetration Suppliers Continued drive for remote access security and the on-going drive for regulatory compliance continue to drive take up in new segments Increasing numbers of existing users of two-factor are realising that management overheads and high product costs dictate a strategy review Enterprise Network Access Flexible working withRemote Access Employees Rate of Adoption Management Enterprise Corporate SMB SoHo Consumer Traditional Authentication market Market opportunity
Passwords are easy to hack "If your company suffered a malicious attack from a fraudster who stole important data or brought down critical business systems what would be the full cost to the business?“ Jason Hart Senior VP, CRYPTOCard
The solution is simple Something that you know Something that you have plus 3468 PIN: Token with a One-Time Passcode You already use it – its called an ATM card
Our products and services Hardware On-demand Hybrid Multi-Platform UB-3 USB token CD-1 Credit Card sized token KT-1 Rugged Steel Key chain token KT-4 Robust Key chain token Laptop BlackBerry Windows Mobile Java phones SafeStick USB device SMS-1 SMS token RB-1 Calculator style KT-2 Polycarbonate Key chain token SC-1 SmartCard token Ironkey Ultra-Secure Token GrIDsure Database Server products Network Server products CRYPTO-MAS Managed Service
CRYPTO-MAS: Simple implementation tools VPN Citrix Firewall JAVA Tokens Outlook SSL SMS Tokens BlackBerry Tokens Remote Web Workplace VPN Terminal Services Citrix CAG, WI, AAC Web Apps Unix Logon IIS Key Chain Tokens Software Tokens NPS/IAS Active Directory Synchronization Apache Linux/Unix
Significant points of difference Designed as a service Simple to use portal Wide token range Simple integrationtools Migration Agent LDAP Agent Integration Agents Six primary innovations of CRYPTO-MAS combine to deliver significant benefits Cloud based architecture Standard Reports included
CRYPTO-MAS: Simple to adopt and deploy Easily integrated and distributed within hours, not days –reducing overheads SUBSCRIBER COMPANY Applications Administrator Active Directory Set-up the customer company MAS 1 2 4 Set-up the customer administrator 2 Access device Add the Access device to the network 3 5 3 Upload User information 4 TOKENS & USERS 5 Add tokens Distribute tokens to users SERVICE PROVIDER 6 6 1 = Customer = Service Provider
BlackShield ID Knowledge, Simplicity, Choice Total Authentication, Made Simple
BlackShield ID: Simple implementation tools VPN Citrix Firewall Outlook USB Devices JAVA Tokens SSL Remote Web Workplace VPN GRID SMS Tokens Citrix CAG, WI, AAC Terminal Services BlackBerry Tokens Web Apps IIS 6 / 7 Unix Logon BlackShield ID NPS/IAS Software Tokens Key Chain Tokens iPhone Token Active Directory Synchronization Windows LogonXP/Vista/Win7 Apache Linux/Unix
LAN, Web & Access protection • Work Flow Connectors • Rule based provisioning • Self enrolment • LDAP pre-Auth • Compliance based reporting • Audit trail reports • Database encryption • Automated alerts • Encrypted data links • Database copy protection Market leading feature set • Integration • Security & Compliance • Non-expiring licences • Automation of reporting • Automation of deployment processes • Agents included • Tokens • TCO • Key-chain, USB, Grid, S/W and Tokenless • Customer programmable • Non-expiring • High levels of security
BlackShield ID: Technology brings advantages Greatly reduced total cost of ownership Best-in-class security Simpler, quicker System administration Straightforward, rapid deployment and integration Industry-leading performance Unrivalled end-user experience All inclusive s/w, Token longevity, Self-enrolment, Self service portal Security policy support, Secure user deployment, Token initialisation Browser basedi/f, Real-time systems reporting, Management by exception, Workflow Automation Multiple LDAP integration, Agents included, Fast authentication .NET based, Fast user look-up, High availability and resilience Token lifecycle management, Great token range, self service portal, Self enrolment
When would you deploy CRYPTOCard? Anywhere you use a password!
Some sample customers • Our biggest sectors are Finance and Government • In the UK we have 24% share in Local Government • Compliance is increasing penetration in other sectors (Retail, Legal) • B2B focussed • Our customers range from 10 seats to 150,000 seats
Example: Stroud & Swindon Who they are Based in Swindon, UK One of 50 UK building societies Head office with 400 people plus 20 offices and 20 agencies in south-west England What they have Over 60 remote workers Financial consultants SSL/VPN remote access network What problem they solved Secure access for confidential client reviews Key features used CRYPTO-MAS Soft tokens Compliance and audit support FSA regulations Secure access from any broadband connection Ad-hoc home working Returning parents Emergency working Lower cost than installing a server Outsourced IT headache Token portability Key benefits “We tend to outsource those elements of infrastructure services that requires specialist knowledge. Authentication isn’t the kind of thing you’d have to do day-in-day-out, so any skills tend to be lost and the cost of employing key specialists in-house doesn’t make sense any more.” Colin CampbellIT Services Manager, Stroud & Swindon
Example: TTT Moneycorp Who they are Based in London, UK Private and corporate money exchange Over 600 employees around the world What they have Secured web and telephone access by corporate customers RB-1 tokens What problem they solved Secure access for monetary transfers Key features used CRYPTO-MAS Security with AES256 and Base 32 Flexible payment options Freedom of access Phone or web Highest levels of security Speed and ease of install Completed in minutes Low total cost of ownership Outsourced overheads No upfront investments Key benefits “CRYPTO-MAS provided an instant, resilient authentication service. The development and installation took minutes as opposed to days, which is impressive given our stringent standards.” Thomas KadriDirector of Support ServicesTTT Moneycorp
Points of difference The first/only major Authentication vendor to deliver a SaaS model Total Cost of Ownership over 5 years CRYPTOCard will be over 50% less expensive than other platforms. CRYPTOCard prides itself on delivering authentication solutions that are easy to use and fast to integrate CRYPTOCard boasts a high level of automation options for user and token management and administration CRYPTOCard has a broad and innovative token technology CRYPTOCard is a pure-play authentication company, has been innovating for more than 20 years and will continue to lead the market. Cloud Based Affordable Easy to Integrate Simple to Manage Innovative Focused