Stronger Mobile Authentication Made Easy
|
|
- Anastasia Sullivan
- 8 years ago
- Views:
Transcription
1 Secure and Simplify Mobile Apps Stronger Mobile Authentication Made Easy October 2013 TraitWare One Market Plaza, Spear Tower, Suite 3600 San Francisco, CA Tel:
2 Table of Contents Choices for Mobile Authentication: Frustrating or Futile... 3 Introducing PhotoAuth... 4 Building on Earlier Pictographic Models... 6 Protection against Common Security Attacks... 7 Shoulder Surfing... 7 Key Stroke Capture... 8 Server Attacks... 8 Defeating Man-in-the-Middle Attacks... 8 Replicated Devices... 8 Ease of Integration... 9 Conclusion Acuity Systems ( ) Page 2
3 Choices for Mobile Authentication: Frustrating or Futile Mobile devices play an increasingly important role both at home and at work. About half of Americans own smartphones, 1 and nearly a third of American adults own tablets. 2 Nearly all organizations (97%) have mobile devices in the workplace. 3 Workers in these organizations are carrying 3.5 devices on average, according to a recent survey by ipass. 4 Juggling a smartphone, a tablet, and a laptop is simply part of a growing number of white collar and blue-collar jobs. No longer simply tools for telephony and calendaring, mobile devices are now commonly used for accessing business applications; for storing and editing business data, including customer records; for purchasing everything from plane tickets to furniture; and for banking and personal financial management (PFM). Smartphones and tablets have become our constant companions, with us all or nearly all hours of the day, 5 small, sleek repositories of everything from and contact lists to data so confidential it is covered by industry regulations and data privacy laws. Not surprisingly, hackers and criminal syndicates see these data-rich devices as prime targets for attack. Android and ios devices make especially tempting targets. Android devices were targeted in 79% of mobile malware attacks, according to a study by the Department of Homeland Security (DHS) and the FBI. 6 Unlike BlackBerrys and an earlier generation of mobile devices built expressly for business use and therefore restricted in their functionality, iphones, ipads, and Android phones and tablets were designed primarily for the consumer market. They were built for ease of use, rather than robustness of defense. In order not to overwhelm typical users, these devices lack rigorous security features or leave security features turned off by default. Exacerbating the security vulnerabilities of mobile devices, most smartphone users ignore even rudimentary protections like screen passcodes that would prevent a stranger who finds a smartphone from accessing all its data. Consider this: a cell phone is lost in the U.S. every 3.5 seconds, and a recent poll found that 22% of smartphone users reported having lost a phone; but 70% of smartphone users continue to leave their phones unprotected by a passcode. 7 When criminals find mobile phones, they usually gain immediate access to , contact lists, photos, local files, and possibly login credentials to business applications and services In a recent survey by Jumio, 72% of Americans reported being within five feet of their smartphones the majority of the time A study by Jupiter Research found an even higher percentage of attacks 92% targeted Android Acuity Systems ( ) Page 3
4 Most likely, part of the reason so many consumers shirk basic mobile security is sheer password fatigue. By 2009, the average computer user was juggling 25 password-protected accounts and 6.5 passwords. 8 Security requirements to change passwords for VPNs and business applications every few months only increase users exasperation with passwords. No wonder that 40% of users avoid using complex passwords or changing their passwords as often as advised, if they can get away with it. 9 Here, then, is the conundrum facing mobile security teams in regulated industries such as financial services and healthcare. The mobile devices used by employees and customers are now storing vitally important data data that can be abused for identity theft, hacking, corporate espionage and more. Yet end users especially consumers are frustrated with the user experience that password-centric user experience commonly associated with enterprisegrade security. Every day, these users are shirking security measures for quick-and-easy access to mobile apps. Is there a way for enterprises that care about security to meet users in the middle a way to give them enterprise-grade security with an easy-to-use user interface? Introducing PhotoAuth TraitWare, a provider of mobile multi-factor solutions, has created a mobile authentication solution called PhotoAuth that is more secure than traditional PINs while also being easy to remember and easy to enter on the smaller screens featured on mobile devices. PhotoAuth makes mobile authentication both simpler and more secure. Authentication solutions typically use one or more techniques leveraging some unique capability of the user. This unique capability could be something you have or something you know. Like a traditional PIN or password, a PhotoAuth image sequence fits in the something you know category. But PhotoAuth sequences are more secure than PINs or passwords, while also being easy to remember and quick to enter. The patent-pending technology behind the PhotoAuth Key consists of a sequence of userselected images, which form a visual key which must be selected by the user on their Smartphone to unlock a mobile app. If the user fails to select the correct image sequence, the TraitWare-protected App is not unlocked and the smartphone cannot be used to authenticate the user. The user selects their personal PhotoAuth Key sequence during the device registration process. The PhotoAuth Key can comprise 4, 5, or 6 images, which the user selects from a set of 24, 48 or 72 images. The Key Length and Set Size can be configured on a per-user or per-application Acuity Systems ( ) Page 4
5 basis according to the level of security required. The total pool of available PhotoAuth images number in the thousands, but the user only sees a fixed set of 24, 48 or 72 images. As the following statistical table illustrates, even at the lowest-strength setting of 4 images out of a set of 24 possible images, this provides 33 times more entropy 10 than a 4-digit numeric PIN code. At the maximum security setting, PhotoAuth provides 139,000 times more entropy than an equivalent numeric PIN. This setting can be easily configured to the level of security appropriate to the application being protected, and can even be changed on a per-user basis. PhotoAuth Key Length PhotoAuth Set Size PhotoAuth Key Entropy as 1-chance-in-XXXX Entropy compared to equivalent Numeric PIN , times the entropy of a 4-digit PIN ,308, ,873,856 2, ,962, times the entropy of a 5-digit PIN ,803,968 2, ,934,917,632 19, ,102, times the entropy of a 6-digit PIN ,230,590,464 12, ,314,069, ,314 Table 1: PhotoAuth Key Entropy Statistics Compared to a Numeric PIN 10 The probability of being able to randomly guess a key set or password is presented in terms of the number of possible combinations, expressed as 2^(entropy). To obtain the entropy, First the number of possible combination is computed, and then the log to base two is computed. This gives the number of bits required to store the probability. For example, if either a 0 or 1 are the possible selections, the entropy is 1 because 2^0 or 2^1 are the only possibilities and expressing these possibilities requires just one bit Acuity Systems ( ) Page 5
6 The following sample image from the TraitWare App shows the PhotoAuth unlock screen. This screen is presented to the User when they launch the TraitWare App: Figure 2: Sample PhotoAuth Screens Because PhotoAuth uses easily remembered images instead of numeric or alphanumeric codes, it is more convenient for the user. It is also more secure because of its larger entropy. The PhotoAuth key sequence serves another important function: it can be used as part of the cryptographic process to sign the TraitWare ID digital signature. For information about this complementary security solution, see the TraitWare white paper, Improving Application Security with Strong, Personalized User Authentication. Building on Earlier Pictographic Models The use of pictograms for computer security purposes first came to prominence with the advent of Personal Digital Assistants (PDAs). Suddenly, users had a small, portable computing device with graphical capabilities that could be applied to common security operations. Considering the security requirements for these devices, which already were storing confidential data, the National Institute for Standards and Technology (NIST) noted: Adequate user authentication is the first line of defense to protecting the resources of a handheld device "Picture Password: A Visual Login Technique for Mobile Devices," Wayne Jansen, Serban Gavrila, Vlad Korelev, Rick Ayers, Ryan Swanstrom, July 2003, NISTIR 7030, National Institute of Standards and Technology Acuity Systems ( ) Page 6
7 The paper proposed that PDAs use a visual login technique as a general-purpose authentication mechanism for users. Creating such a technique became much easier with the introduction of smartphones with touchscreen technology. On touchscreen devices, high-resolution images could be tapped, dragged, and moved in a variety of ways. In 2003, Takada and Koike proposed using images instead of passwords for mobile phone authentication, noting at the time that there were 20 million users of mobile phones in Japan already many with images on their phones. 12 Further studies of the use of images for authentication were published by Dumpy of Newcastle University and Heiner and Asokan of Noika in Graphically drawn passwords, such as those used in the Microsoft Windows 8 system, were addressed recently by Zhao, Ahn and Seo of Arizona University and Hu of Delaware University. The design of PhotoAuth takes these earlier works into consideration. For ease of use, PhotoAuth can be configured to use key sets (sequences of selected images) that are 4, 5, or 6 images long, depending on the strength of security desired by the user. The design currently enables a user to select a key set from image sets of 24, 48 and 72 pictures. A 24-image set can be displayed on a single screen of iphone 4 and 5 series phones as well as on a single screen of more recent Android phones. When the larger image sets are used (48 and 72), the user can easily access the full list by scrolling. The Takada and Dumpy designs used multiple screens of images but not the scrollable grid featured by PhotoAuth. The Zhao, et. al., study found user preferences degraded the entropy of picture gesture authentication, such as the drawing system used in Microsoft Windows 8, from a theoretical entropy value of 30.1 to Protection against Common Security Attacks PhotoAuth is defined to protect against common security attacks, including those described here. Shoulder Surfing The Nokia studies found that high entropy systems significantly increase the number of observations required for successful shoulder surfing (the surreptitious observation of a mobile user s onscreen activity). Shoulder surfing becomes more difficult when PhotoAuth image sets contain 30 or more images, making it likely that the user will be quickly scrolling between images to input the 12 "Awase-E: Image-based authentication for mobile phones using user s favorite images", Tetsuji Takada, Hideki Koike, 2003/1/1, Human-computer interaction with mobile devices and services, , Springer Berlin Heidelberg 13 "On The Security of picture Gesture Authentication", Zimming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu, Proceedings of the 22nd USENIX Security Symposium, August 14-16, 2013 Washington, DC 2013 Acuity Systems ( ) Page 7
8 authentication sequence. PhotoAuth also supports an option to randomly display the images each time the app is opened. The observer would have to quickly identify and remember each image, ignoring its location, in order to replicate the authentication sequence. Key Stroke Capture PhotoAuth is designed to be safe from keyloggers and malware that records the location of touches on the screen. Capturing the location of touches is not sufficient for deriving the PhotoAuth authentication hash, since the hash does not incorporate image location data. If PhotoAuth s random image-location option is turned on, even an attacker who managed to use a keylogger to capture the locations of images used in the authentication sequence would still not be able to select the correct image on a stolen or replicated device. Server Attacks PhotoAuth also protects against the theft of PhotoAuth key signatures stored on a server. PhotoAuth signatures are hashed and never stored in the clear. An important advantage of PhotoAuth key signatures over standard passwords is that PhotoAuth signatures combine image data (which can include pixel data and other data, such as camera specifications, image date, cropping information) with the identity of each image selected. This rich combination of data results in a very high entropy input being used to create a hexadecimal hash of 40 digits with an entropy of 160. This high degree of entropy makes it essentially impossible to determine the image information needed to recreate the hash. There have been cases reported where the hash of standard passwords were obtained and where more than 40% of the passwords were recreated using rainbow tables. 14 Rainbow tables would likely prove ineffective against PhotoAuth key signatures. PhotoAuth displays random picture sets culled from a large collection of images, making it difficult for hackers to obtain the files necessary to construct a rainbow table. Defeating Man-in-the-Middle Attacks The TraitWare system uses digital signing where the private key used for signing is not stored on the device but is generated from the PhotoAuth key. The server will not accept a captured PhotoAuth key unless the transmission is correctly signed. Replicated Devices PhotoAuth is designed to make replicating a device with captured data extremely difficult. Even if someone manages to get the PhotoAuth selection key, they would still have to capture the user s device or create a replicated device. During the PhotoAuth registration process each 14 A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. For more information about rainbow tables, see Acuity Systems ( ) Page 8
9 user is provided with a random selection of stock images from a larger set. This makes it difficult for someone trying to replicate a device to get the all the images to create a user image set. Without the correct image set and image file information the correct hash to authenticate cannot be created. Ease of Integration TraitWare has designed the PhotoAuth solution for ease of integration into mobile applications and mobile environments. Client-side software components can be easily incorporated into mobile apps on platforms such as Android and ios. Server-side software uses secure REST interfaces that can be configured to interoperate with directory services, mobile provisioning services, and other IT infrastructure and services. TraitWare also provides a stand-alone mobile security app that allows PhotoAuth and other TraitWare security technology to be used in multi-factor authentication solutions for business applications, payment systems, and other online services that require rigorous authentication. Conclusion Sales of mobile devices are expected to rise sharply sharply for years to come. More users adopt smartphones, tablets, and other devices such as smart watches. In this post-pc era, mobile computing may eventually come to be thought of simply as computing. As mobile computing becomes more prevalent, the challenges of mobile security will become more pressing. The biggest challenge for enterprises and mobile app providers will be to provide rigorous, hacker-proof security through a user experience that s fast and easy to use an experience that suits not just IT-savvy professionals, but also the general public. By integrating PhotoAuth into mobile apps and services, enterprises and mobile app developers can help users protect mobile data without the need for complex passwords or extraneous hardware. Available today, PhotoAuth provides enterprise-grade security with consumer-grade usability. It s security that mobile users want to use. To learn more about PhotoAuth, please sales@traitware.com or call +1 (415) Acuity Systems ( ) Page 9
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationAwase-E: Image-based Authentication for Mobile Phones using User s Favorite Images
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationMoving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationMoving Beyond User Names & Passwords Okta Inc. info@okta.com 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Moving Beyond
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSpring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationCONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM
CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM Executive Summary There has been a fundamental shift in how people collaborate in today
More informationWelcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
More informationIDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationSecurely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
More informationMulti-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationThe Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationSECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
More informationSmart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
More informationRemote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
More informationContents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationipad in Business The Top Considerations
ipad in Business The Top Considerations iphone and ipad are the best mobile devices in the world and have transformed the way people work with over 98 percent of the Fortune 500 and over 92 percent of
More informationSoft tokens for SMS PASSCODE SMS PASSCODE 2014
SMS PASSCODE 2014 Table of Contents Configuring SMS PASSCODE for soft tokens... 3 Pre-requisites... 3 Enabling token support in SMS PASSCODE... 3 Creating a Token Policy... 3 Create a new User Group Policy
More informationMulti-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
More informationMODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
More informationWhite Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
More informationWhitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
More informationMultifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationTwo Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
More informationHow Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationHow to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
More informationOnline Services User Guide
Online Services User Guide Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. Log In: BankMidwest.com Online
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationWHITE PAPER. Mobile Document Management. with eakte2go*
WHITE PAPER Mobile Document Management with eakte2go* Contents The New World of Apps... 3 Electronic files for businesses... 3 Government Agencies as a Modern Employer... 4 The eakte2go App... 5 An Opportunity:
More informationWhitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
More informationWHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationTrends in Mobile Authentication. cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona esther.haenggi@cnlab.ch, +41 55 214 33 36
Trends in Mobile Authentication cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona esther.haenggi@cnlab.ch, +41 55 214 33 36 E-banking authentication mtan 2 Phishing passiv Man-in-the-Middle
More informationExchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationConvenience and security
Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationA Guide For Reviewers. A Guide For Reviewers
Table Of Contents WELCOME TO PASSWORD BOSS!.... 2 PASSWORD BOSS: A SMARTER WAY TO STAY SECURE ONLINE....3 HOW PASSWORD BOSS PROTECTS YOUR SECURITY AND PRIVACY.... 5 INSTALLING PASSWORD BOSS AND CREATING
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More information7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
More informationOne-Time Password Contingency Access Process
Multi-Factor Authentication: One-Time Password Contingency Access Process Presenter: John Kotolski HRS Security Officer Topics Contingency Access Scenarios Requesting a Temporary One-Time Password Reporting
More informationSimplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
More informationMOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA
More informationHELPFUL TIPS: MOBILE DEVICE SECURITY
HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationdedicated to the continous growth of technology Mobile smart card solution Security with style
dedicated to the continous growth of technology Mobile smart card solution Security with style Simple worry-free security! Data security is now in public focus and it has become one of the major IT challenges
More informationSticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationWhite Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
More informationSolving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
More informationINFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
More informationHow TraitWare TM Can Secure and Simplify the Healthcare Industry
How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability
More informationBrainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationReviewer Guide Core Functionality
securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password
More informationConfigure SLC Email to Smartphone/ Tablet
Configure SLC Email to Smartphone/ Tablet This is a manual that contains pertinent information about configuring your SLC Email to your smartphone/tablet. About Set up your email account on your smartphone/tablet
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationIdentity Access Management: Beyond Convenience
Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking
More informationMobile Security: Controlling Growing Threats with Mobile Device Management
Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationEnabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationWhite Paper. The Principles of Tokenless Two-Factor Authentication
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
More informationKeeping Data Safe. Patients, Research Subjects, and You
Keeping Data Safe Patients, Research Subjects, and You How do hackers access a system Hackers Lurking in Vents and Soda Machines By NICOLE PERLROTH APRIL 7, 2014 New York Times SAN FRANCISCO They came
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More information8 Critical Requirements for Secure, Mobile File Transfer and Collaboration
A N A C C E L L I O N W H I T E P A P E R 8 Critical Requirements for Secure, Mobile File Transfer and Collaboration Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationSmartwatch Security Research
Smartwatch Security Research Overview This report commissioned by Trend Micro in partnership with First Base Technologies reveals the security flaws of six popular smartwatches. The research involved stress
More informationTwo-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationTop Five Ways to Protect Your Network. A MainNerve Whitepaper
A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State
More informationEmail setup information for most domains hosted with InfoRailway.
Email setup information for most domains hosted with InfoRailway. Incoming server (POP3): pop.secureserver.net port 995 (SSL) Incoming server (IMAP): imap.secureserver.net port 993 (SSL) Outgoing server
More informationEncryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
More informationIt s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
More informationMobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper
Mobile Content Collaboration and its Benefits Across Your Enterprise Mobile Content Collaboration and its Benefits Across Your Enterprise 866-7-BE-GOOD good.com 2 Contents Introduction The Key Elements
More informationIBM Cognos Mobile Overview
IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationSecuring end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
More informationFrequently asked questions
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
More informationIDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
More informationArcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer
Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use
More informationSectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More information