1 / 22

An Introduction to CRYPTOCard Date

An Introduction to CRYPTOCard Date. Presented by:- A Sales person. At a glance. CRYPTOCard delivers Authentication to secure digital identities We deliver via traditional server & unique SaaS models Broad industry use and dominant in key sectors

tallys
Download Presentation

An Introduction to CRYPTOCard Date

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Introduction to CRYPTOCard Date Presented by:- A Sales person

  2. At a glance • CRYPTOCard delivers Authentication to secure digital identities • We deliver via traditional server & unique SaaS models • Broad industry use and dominant in key sectors • In the UK we have 24% share in Local Government • B2B focussed • Our biggest customers have 50,000 – 150,000 seats • Our points of difference are: • SaaS model • Focus on automation of provisioning and integration • Token quality and range • Low TCO CRYPTOCard – The Authority in Securing Digital Identities

  3. CRYPTOCard: A history of innovation 4 KT-1Key chain introduced Company founded BlackShield IDintroduced CRYPTO-MASintroduced KT-4 Key chain introduced SMS Tokenintroduced Java Token launched Blackberrytoken introduced RB-1 token introduced Grid Token launched SC-1 Smart Card introduced UB-1 USB Token introduced AuthEngineintroduced InnovativeProduct of 2008 Best of Show MacWorld Linux version introduced Harrodsbecame customer Bombardierbecame customer Applebecame customer NASA - our first major customer BMW became customer CMS-CMSKbecame a customer Comic Reliefbecame a customer Yorkshire Building Society became a Customer Isle of Wightbecame a Customer World’s first Mac authentication solution introduced

  4. Our Geographic Spread Coverage and sales in over 70 countries for thousands of companies North America EMEA R o W A competitive market in which we have established our largest customers KEY FACTS:- Locations: Ottawa Focus:- Engineering, Operations, Support, Finance, Strong growth over past 2 years and massive potential for the future KEY FACTS:- Locations: Bristol, Bracknell, Eindhoven Focus:- Sales, Marketing, Support A tactical market for the next 2 years KEY FACTS:- Continuous production facility in China

  5. Written down Easy to crack Easy to guess Difficult to audit Hard to remember Easy to steal Expensive to manage The problem with passwords Passwords are the weakest link in the security chain:Nearly every successful Hacking, Phishing or ID theft attempt involves obtaining a password

  6. The password gremlins Many customers have secured their internal network, using managed services to deliver Anti-virus, Firewalls, Content Filtering, Anti-Spam, Anti-Spyware... BUT......... Workstations Branch Offices Your people PDA Users Database server DMZ Access Router Firewall PBX / Phone System Network Server Mobile Staff Your customers Wireless Workstations Remote Users 3rd Party Access ....... very few businesses realise that their cloud-based services and remote access networks are a risk – because they are only secured by a static password

  7. Market opportunity for Authentication Increasing take-up of cloud based services and desire for on-line collaboration tools increase the need for password replacement solutions Longer term:- Authentication as part of an integrated workflow Move to federated ID world using SAML and other open standards Rate of Deployment Banking Customer Access Consumers Partners Cloud based and on-line services, web based collaboration solutions Market Penetration Suppliers Continued drive for remote access security and the on-going drive for regulatory compliance continue to drive take up in new segments Increasing numbers of existing users of two-factor are realising that management overheads and high product costs dictate a strategy review Enterprise Network Access Flexible working withRemote Access Employees Rate of Adoption Management Enterprise Corporate SMB SoHo Consumer Traditional Authentication market Market opportunity

  8. Passwords are easy to hack "If your company suffered a malicious attack from a fraudster who stole important data or brought down critical business systems what would be the full cost to the business?“ Jason Hart Senior VP, CRYPTOCard

  9. The solution is simple Something that you know Something that you have plus 3468 PIN: Token with a One-Time Passcode You already use it – its called an ATM card

  10. Our products and services Hardware On-demand Hybrid Multi-Platform UB-3 USB token CD-1 Credit Card sized token KT-1 Rugged Steel Key chain token KT-4 Robust Key chain token Laptop BlackBerry Windows Mobile Java phones SafeStick USB device SMS-1 SMS token RB-1 Calculator style KT-2 Polycarbonate Key chain token SC-1 SmartCard token Ironkey Ultra-Secure Token GrIDsure Database Server products Network Server products CRYPTO-MAS Managed Service

  11. CRYPTO-MAS: Simple implementation tools VPN Citrix Firewall JAVA Tokens Outlook SSL SMS Tokens BlackBerry Tokens Remote Web Workplace VPN Terminal Services Citrix CAG, WI, AAC Web Apps Unix Logon IIS Key Chain Tokens Software Tokens NPS/IAS Active Directory Synchronization Apache Linux/Unix

  12. Significant points of difference Designed as a service Simple to use portal Wide token range Simple integrationtools Migration Agent LDAP Agent Integration Agents Six primary innovations of CRYPTO-MAS combine to deliver significant benefits Cloud based architecture Standard Reports included

  13. CRYPTO-MAS: Simple to adopt and deploy Easily integrated and distributed within hours, not days –reducing overheads SUBSCRIBER COMPANY Applications Administrator Active Directory Set-up the customer company MAS 1 2 4 Set-up the customer administrator 2 Access device Add the Access device to the network 3 5 3 Upload User information 4 TOKENS & USERS 5 Add tokens Distribute tokens to users SERVICE PROVIDER 6 6 1 = Customer = Service Provider

  14. BlackShield ID Knowledge, Simplicity, Choice Total Authentication, Made Simple

  15. BlackShield ID: Simple implementation tools VPN Citrix Firewall Outlook USB Devices JAVA Tokens SSL Remote Web Workplace VPN GRID SMS Tokens Citrix CAG, WI, AAC Terminal Services BlackBerry Tokens Web Apps IIS 6 / 7 Unix Logon BlackShield ID NPS/IAS Software Tokens Key Chain Tokens iPhone Token Active Directory Synchronization Windows LogonXP/Vista/Win7 Apache Linux/Unix

  16. LAN, Web & Access protection • Work Flow Connectors • Rule based provisioning • Self enrolment • LDAP pre-Auth • Compliance based reporting • Audit trail reports • Database encryption • Automated alerts • Encrypted data links • Database copy protection Market leading feature set • Integration • Security & Compliance • Non-expiring licences • Automation of reporting • Automation of deployment processes • Agents included • Tokens • TCO • Key-chain, USB, Grid, S/W and Tokenless • Customer programmable • Non-expiring • High levels of security

  17. BlackShield ID: Technology brings advantages Greatly reduced total cost of ownership Best-in-class security Simpler, quicker System administration Straightforward, rapid deployment and integration Industry-leading performance Unrivalled end-user experience All inclusive s/w, Token longevity, Self-enrolment, Self service portal Security policy support, Secure user deployment, Token initialisation Browser basedi/f, Real-time systems reporting, Management by exception, Workflow Automation Multiple LDAP integration, Agents included, Fast authentication .NET based, Fast user look-up, High availability and resilience Token lifecycle management, Great token range, self service portal, Self enrolment

  18. When would you deploy CRYPTOCard? Anywhere you use a password!

  19. Some sample customers • Our biggest sectors are Finance and Government • In the UK we have 24% share in Local Government • Compliance is increasing penetration in other sectors (Retail, Legal) • B2B focussed • Our customers range from 10 seats to 150,000 seats

  20. Example: Stroud & Swindon Who they are Based in Swindon, UK One of 50 UK building societies Head office with 400 people plus 20 offices and 20 agencies in south-west England What they have Over 60 remote workers Financial consultants SSL/VPN remote access network What problem they solved Secure access for confidential client reviews Key features used CRYPTO-MAS Soft tokens Compliance and audit support FSA regulations Secure access from any broadband connection Ad-hoc home working Returning parents Emergency working Lower cost than installing a server Outsourced IT headache Token portability Key benefits “We tend to outsource those elements of infrastructure services that requires specialist knowledge. Authentication isn’t the kind of thing you’d have to do day-in-day-out, so any skills tend to be lost and the cost of employing key specialists in-house doesn’t make sense any more.” Colin CampbellIT Services Manager, Stroud & Swindon

  21. Example: TTT Moneycorp Who they are Based in London, UK Private and corporate money exchange Over 600 employees around the world What they have Secured web and telephone access by corporate customers RB-1 tokens What problem they solved Secure access for monetary transfers Key features used CRYPTO-MAS Security with AES256 and Base 32 Flexible payment options Freedom of access Phone or web Highest levels of security Speed and ease of install Completed in minutes Low total cost of ownership Outsourced overheads No upfront investments Key benefits “CRYPTO-MAS provided an instant, resilient authentication service. The development and installation took minutes as opposed to days, which is impressive given our stringent standards.” Thomas KadriDirector of Support ServicesTTT Moneycorp

  22. Points of difference The first/only major Authentication vendor to deliver a SaaS model Total Cost of Ownership over 5 years CRYPTOCard will be over 50% less expensive than other platforms. CRYPTOCard prides itself on delivering authentication solutions that are easy to use and fast to integrate CRYPTOCard boasts a high level of automation options for user and token management and administration CRYPTOCard has a broad and innovative token technology CRYPTOCard is a pure-play authentication company, has been innovating for more than 20 years and will continue to lead the market. Cloud Based Affordable Easy to Integrate Simple to Manage Innovative Focused

More Related