Security and Usability

Size: px
Start display at page:

Download "Security and Usability"

Transcription

1 Security and Usability David Hunt: DCH Technology Services

2 A Financial Services View Active Security Passive Security Technologies Impact on Users Big Data Consumer context, do we know you?

3 Active Security The perfect software system from a security architecture perspective: Highly Secure. Many different security technologies. User id, password RCA type Token 2 Factor Authentication

4 Active Security Why users dislike too much active security, payments: Intrusive RCA Token --- Mobile!! Not always intuitive 2FA requirements to enroll for MPS payments User ID to authorize payments NFC Chip and PIN QR codes

5 Partnerships and extended networks Extension of traditional partnerships Creation of new opportunities Extended threats Biometrics

6 Extension of traditional partnerships Introduces a set of new partnerships (TSM) and opportunities (SIMM) and creates new threats through the extended network.

7 The SIMM card can provide a high degree of security on a mobile device same capabilities as a credit debit card. Creation of new opportunities Phone only Alternative secure elements???

8 Extended threats Personal Cloud OpenID??? Consumers will look to create a extended world of APPS and data on their personal devices. This creates threat opportunities on these devices as no single APP/provider is in control, or can set standards or security policies.

9 Biometrics the silver bullet?? Apple buys fingerprint security firm AuthenTec The Galaxy S4, like Apple's iphone, has voice recognition software but at present it cannot identify a particular person. In future, it's possible that a smartphone could recognise its owner's voice and unlock accordingly. Nuance Voice Biometrics My voice is my password. Samsung has had a "Face Unlock" feature in its phones since the Galaxy S3. It s early days yet

10 Passive Security Big Data and Security Analytics Consumer context, do we know you?

11 Big Data Fraud detection Already employs an element of passive security data collection Profiling Transaction History Location Tracking Big Data will take this to a new level

12 Role of Big Data Analytics Enhance the current fraud and security processes How well do we trust the current user?? What is the appropriate security token for a given transaction What additional information do I need for a given transaction.

13 How well do we know you? The value of customer context Convergence of Security and Marketing through the use of big data analytics Collecting browsing behaviours Mining data in transaction histories Buying in 3 rd party data Location behaviours Security vs privacy of the individual Unique in the crowd: The privacy bounds of human mobility

14 Studied fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier s antennas, four spatiotemporal points are enough to uniquely identify 95% of the individuals While in the past, mobility traces were only available to mobile phone carriers, the advent of smartphones and other means of data collection has made these broadly available. For example, Apple has recently updated its privacy policy to allow sharing the spatio-temporal location of their users with partners and licensees Furthermore, it is estimated that a third of the 25B copies of applications available on Apple s App StoreSM access a user s geographic location, and that the geo-location of, 50% of all ios and Android traffic is available to ad networks. All these are fuelling the ubiquity of simply anonymized mobility datasets and are giving room to privacy concerns.

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

Multi-factor Mobile Authentication

Multi-factor Mobile Authentication Multi-factor Mobile Authentication Ram Ramachandran Program Director, Adv. Technologies IBM Research pgramach@us.ibm.com June 9, 2014 Password Authentication Who is using this mobile device? Valuable information

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options

More information

How Secure is Authentication?

How Secure is Authentication? FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Are Mobile Devices the Answer to the Strong Authentication Problem?

Are Mobile Devices the Answer to the Strong Authentication Problem? Are Mobile Devices the Answer to the Strong Authentication Problem? SESSION ID: TECH-T08 Moderator: Panelists: Alphonse (Al) Pascual Senior Analyst, Security, Risk & Fraud Javelin Strategy & Research Michael

More information

Secure Your Enterprise with Usher Mobile Identity

Secure Your Enterprise with Usher Mobile Identity Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize

More information

Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014

Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014 Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014 The fastest selling gadget in history 2 billion people have smartphones with internet and touchscreen 4 billion by 2020

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge

More information

Innovation and Emerging Payments/FinTech

Innovation and Emerging Payments/FinTech Innovation and Emerging Payments/FinTech The Regulatory Perspective Wild, Wild West 2006-2 008 2009-2 010 2011 2012 2013-2 014 Remote Payments - SMS & Internet Mobile Browser QR Codes mpos PayPal Here

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Installation Introduction

Installation Introduction Installation Introduction It only takes a few steps to get things set up properly so you can be using the Safety Meeting App in no time. Its as easy as 1-2-3: 1) 2) 3) Enroll Your Company and Get your

More information

Apple Pay & The New Environment for Mobile Payment Apps

Apple Pay & The New Environment for Mobile Payment Apps Apple Pay & The New Environment for Mobile Payment Apps Events, Timing & Methodology I SEPT 9 Apple Press Conference SEPT 18 2104 CPM Data Collection SEPT 25 iphone6 In-Stores Consumer Payments Monitor

More information

Special Report: Trends in Mobile Payment April 2015

Special Report: Trends in Mobile Payment April 2015 Special Report: Trends in Mobile Payment April 2015 Contents Executive Summary Consumers Adopting Mobile Mobile Payment Methods Leveraging Mobile Payments Enabling Your Business 2 Confidential & Proprietary

More information

OCBC BANK FIRST TO LAUNCH BIOMETRIC AUTHENTICATION FOR A BUSINESS BANKING MOBILE APP

OCBC BANK FIRST TO LAUNCH BIOMETRIC AUTHENTICATION FOR A BUSINESS BANKING MOBILE APP MEDIA RELEASE Media Release Includes suggested Tweets, Facebook posts, keywords and official hashtags OCBC BANK FIRST TO LAUNCH BIOMETRIC AUTHENTICATION FOR A BUSINESS BANKING MOBILE APP Corporate customers

More information

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs Rolf Lindemann, Nok Nok Labs cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Authentication in Context Single Sign-On Modern Authentication Federation

More information

Cloud Services MDM. Control Panel Provisioning Guide

Cloud Services MDM. Control Panel Provisioning Guide Cloud Services MDM Control Panel Provisioning Guide 10/24/2014 CONTENTS Overview... 2 Accessing MDM in the Control Panel... 3 Create the MDM Instance in the Control Panel... 3 Adding a New MDM User...

More information

Mobile Financial Services

Mobile Financial Services Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity

More information

ONE LESS THING TO WORRY ABOUT.

ONE LESS THING TO WORRY ABOUT. CFS-DM Firestop documentation manager ONE LESS THING TO WORRY ABOUT. Hilti. Outperform. Outlast. CFS-DM Firestop documentation manager FOR PEACE OF MIND. Preventing the spread of smoke and fire in a building

More information

General information about NFC technology

General information about NFC technology General information about NFC technology What is NFC? How does it work? What is a tap? What is link between NFC technology and Tapit? NFC stands for Near Field Communication. This is a short range wireless

More information

U.S. Mobile Benchmark Report

U.S. Mobile Benchmark Report U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral

More information

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential

More information

Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)

Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones) Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones) As part of Sony Pictures commitment to enabling our workforce with the best technology and related tools available,

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

ANDROID APPS FOR RETAIL WHY SHOULD YOU HAVE ONE?

ANDROID APPS FOR RETAIL WHY SHOULD YOU HAVE ONE? WHY SHOULD YOU HAVE ONE? 1. STRONG MARKET SHARE According to the latest smartphone sales data from Kantar Worldpanel ComTech, by May 2015, the percentage of Android smartphone market share in the UK was

More information

A Solution to the Mobile Wallet Conundrum

A Solution to the Mobile Wallet Conundrum A Solution to the Mobile Wallet Conundrum 2014 Cortex MCP Page 1 Introduction: A new approach is needed to make the Mobile Wallet mainstream More people than ever are using smartphones to place and take

More information

WHAT IS A MOBILE WALLET? AN INTRO TO MOBILE WALLETS

WHAT IS A MOBILE WALLET? AN INTRO TO MOBILE WALLETS WHAT IS A MOBILE WALLET? AN INTRO TO MOBILE WALLETS WHAT IS A MOBILE WALLET? PART 1 CONSUMER TECHNOLOGY Perhaps you are skeptic about mobile wallets and if your Credit Union membership will adopt them.

More information

NC CJIN Governing Board. 13 October, 2011. George A. White

NC CJIN Governing Board. 13 October, 2011. George A. White Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements

More information

GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M. July 2013

GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M. July 2013 GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M July 2013 S P E A K E R S David Pollington GSMA (UK/EU) Andrew Johnston TELUS (CANADA) Scott Rice PACIFICEAST / OIX TDWG (US) Telecom

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with

More information

How Secure are Contactless Payment Systems?

How Secure are Contactless Payment Systems? SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2

More information

How Secure is Authentication?

How Secure is Authentication? U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered

More information

OVERVIEW OF MOBILE PAYMENT LANDSCAPE

OVERVIEW OF MOBILE PAYMENT LANDSCAPE OVERVIEW OF MOBILE PAYMENT LANDSCAPE NEACH FORUM September 10, 2014 Marianne Crowe Federal Reserve Bank of Boston Disclaimer: The views expressed in this presentation are those of the presenter and do

More information

OVERVIEW OF MOBILE PAYMENT LANDSCAPE Marianne Crowe Federal Reserve Bank of Boston NEACH September 10, 2014

OVERVIEW OF MOBILE PAYMENT LANDSCAPE Marianne Crowe Federal Reserve Bank of Boston NEACH September 10, 2014 OVERVIEW OF MOBILE PAYMENT LANDSCAPE Marianne Crowe Federal Reserve Bank of Boston NEACH September 10, 2014 Disclaimer: The views expressed in this presentation are those of the presenter and do not necessarily

More information

mcashier User Guide To accept payments To cancel a payment

mcashier User Guide To accept payments To cancel a payment mcashier User Guide To accept payments 1. Enter the purchase amount in the app. If desired, you can enter a reference under the amount (e.g. the product name). The reference will appear on the receipt.

More information

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy

More information

U.S. Mobile Payments Landscape NCSL Legislative Summit 2013

U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston August 13, 2013 2 Agenda Overview of Mobile Payments Landscape

More information

Epic Remote Access for Mobile Devices FAQ and Setup

Epic Remote Access for Mobile Devices FAQ and Setup Epic Remote Access for Mobile Devices FAQ and Setup Frequently Asked Questions: How do I request access to Epic for my mobile device? Which mobile devices are supported? What is the mobile device owner

More information

Click to edit Master title style

Click to edit Master title style About Alexandra Instituttet A/S Non-profit application oriented research institution focus on IT GTS Godkendt Teknologisk Service Institut 100+ employees generating R&D Researchers Providers Users Commercial

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

Scalable Authentication

Scalable Authentication Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

Lee Barnes, CTO Utopia Solutions. Utopia Solutions

Lee Barnes, CTO Utopia Solutions. Utopia Solutions Mobile Technology Testing Are You Ready? Lee Barnes, CTO Utopia Solutions Agenda 1. Mobile Testing Challenges 2. Mobile Testing Practices 3. Mobile Test Automation 4. Summary and Q & A Mobile Testing Challenges

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Tel: 07785 771 721 E-mail: mail@daidavis.com Overview BYOD

More information

The State of Pay. A mobile revolution. semble.co.nz

The State of Pay. A mobile revolution. semble.co.nz The State of Pay A mobile revolution semble.co.nz 2 November 2015 2 Overview The introduction of the mobile wallet represents the most significant evolution in payments for New Zealand since the Eftpos

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

More information

interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps

interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your computer to

More information

Apple Pay & The New Environment for Mobile Payment Apps

Apple Pay & The New Environment for Mobile Payment Apps Apple Pay & The New Environment for Mobile Payment Apps November 3, 2014 Greg Weed Greg.Weed@phoenixmi.com 828-697-9192 Events, Timing & Methodology I SEPT 9 Apple Press Conference SEPT 18 2104 CPM Data

More information

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing

More information

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Voice biometrics Advait Deshpande 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Imagine a world without PINS/Passwords 2002-2013 Nuance Communications, Inc. All rights reserved. Page

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

How can I protect against the loss of my ID if my device is lost or stolen?

How can I protect against the loss of my ID if my device is lost or stolen? How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.

More information

Neustar Intelligent Cloud Services

Neustar Intelligent Cloud Services Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

Mobile Banking FAQ Page 1 of 9

Mobile Banking FAQ Page 1 of 9 Page 1 of 9 allows anyone with existing online banking access to see their account information from a mobile phone. can be Text Banking, Mobile Browser Banking or Smartphone App Banking. General Questions

More information

Engage Mobile Security Whitepaper

Engage Mobile Security Whitepaper Engage Mobile Security Whitepaper NavisHealth Platform Products NavisHealth September 2014 About NavisHealth NavisHealth is a Silicon Valley, Digital Health IT Solutions Company that provides a cloud-based

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

APPLE & ANDROID. User Guide BNC ONLINE BANKING

APPLE & ANDROID. User Guide BNC ONLINE BANKING APPLE & ANDROID User Guide BNC ONLINE BANKING Deposit Checks from your Smartphone! ABOUT ROC KIT ANYWHERE With ROC-KIT Anywhere, you don t have to make trips to the bank to deposit checks. For consumer

More information

Two-Factor Authentication User FAQ s

Two-Factor Authentication User FAQ s Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do

...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do ...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do (2013 DATA BREACH INVESTIGATIONS REPORT p.1) MOBILE D EVICE S AFETY

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Deploying our multichannel

Deploying our multichannel Deploying our multichannel approach Christopher Coonen, EVP Global Solutions, Sales & Marketing Jean Marc Thienpont, EVP Mobile payment Peter de Caluwe, EVP e payment (ex Ogone CEO) 1 In store strategy

More information

One Platform for all your Print, Scan and Device Management

One Platform for all your Print, Scan and Device Management One Platform for all your Print, Scan and Device Management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Your MSU App - Rave. Alerts, Guardian Safety App and E-TIPS

Your MSU App - Rave. Alerts, Guardian Safety App and E-TIPS Your MSU App - Rave Alerts, Guardian Safety App and E-TIPS Montclair State University continues to be a leader amongst higher education institutions in utilizing mobile technology for students to assist

More information

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

Samsung SDS. Fast IDentity Online

Samsung SDS. Fast IDentity Online Samsung SDS Innovating User In the era of Digital Convergence In the coming era of digital convergence, user authentication is becoming increasingly important as a gateway to the digital world. Companies

More information

TECHNOLOGY WHITEPAPER

TECHNOLOGY WHITEPAPER TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire 03062 +1 603 123 7654 twitter.com/armorvox linkedin/in/armorvox Securing Citizen

More information

BY THE NUMBERS. Understanding the mobile gaming landscape through Unity metrics

BY THE NUMBERS. Understanding the mobile gaming landscape through Unity metrics BY THE NUMBERS Understanding the mobile gaming landscape through Unity metrics September 2015 ABOUT THIS REPORT As the game development platform with the largest market share, Unity is uniquely positioned

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Trends in Mobile Authentication. cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona esther.haenggi@cnlab.ch, +41 55 214 33 36

Trends in Mobile Authentication. cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona esther.haenggi@cnlab.ch, +41 55 214 33 36 Trends in Mobile Authentication cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona esther.haenggi@cnlab.ch, +41 55 214 33 36 E-banking authentication mtan 2 Phishing passiv Man-in-the-Middle

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization

More information

MCX/CURRENTC. This payment app will be unique from other mobile payments options in that it is not device specific. Consumers

MCX/CURRENTC. This payment app will be unique from other mobile payments options in that it is not device specific. Consumers Payment Services WHITE PAPER MOBILE PAYMENTS TECHNOLOGY Intelligent solutions to connect with your members. THE HISTORY OF MOBILE As mobile devices have permeated the marketplace, developers have focused

More information

Whitepaper on identity solutions for mobile devices

Whitepaper on identity solutions for mobile devices Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The

More information

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the

More information

Payeezy.com Security in Apple Pay In-App Development

Payeezy.com Security in Apple Pay In-App Development Payeezy.com Security in Apple Pay In-App Development TM Unlike wallets of the past that saw weak consumer engagement, demand for Apple Pay is being driven directly by consumers. Today, developers are seeing

More information

Mobile Security Solution BYOD

Mobile Security Solution BYOD Mobile Security Solution BYOD 1 Blending boundaries between devices, apps and users Personal Mobile Devices Unknown Mobile Apps Corporate data on public cloud apps Zscaler Secure Cloud Gateway Business

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Password Reset PRO Version 3 Operational Summary and Screenshots

Password Reset PRO Version 3 Operational Summary and Screenshots Password Reset PRO Version 3 Operational Summary and Screenshots This guide covers screenshots relating to iphone / mobile device self service access, Profile Enrollment Mode access and Active Directory

More information