Make it Mobile. How to successfully implement a secure mobile strategy.
|
|
|
- Isabella McDonald
- 10 years ago
- Views:
Transcription
1 Make it Mobile How to successfully implement a secure mobile strategy
2 Make it Mobile The mobile revolution is inexorable. Mobile devices such as smart phones, netbooks and tablets proliferate in today s personal and professional environment. In order to adapt to the fast-paced virtualization and mobilization trend, organizations worldwide will have to make their applications, data and corporate information accessible from any portable device for customers, suppliers and employees. Do benefits outweigh concerns? The accessibility of mobile applications and mobile working yields many benefits: it can be time-saving, cost reducing and the added bonus of flexibility can enhance overall productivity and customer loyalty. While embracing the flexibility of mobile working, it is essential not to be heedless of the dangers that may come with it. Concerns about data integrity, the privacy and accessibility of sensitive data, and data protection requirements are the most significant obstacles for financial and business organizations to embrace the mobile trend. Potential threats for mobile applications such as m-banking and m-commerce or even remote access to a corporate network, are similar to those of traditional applications, only the platform and technology have changed. As the business world will continue to change under the influence of continuous technological developments, working practices will change as well. And with the increasing trend of BYOD (Bring Your Own Device) on the work floor, security remains all-important. Mobile Facts there will be 2.1 billion mobile phones worldwide by % 14.2 % 3.3 % 2.7 % 0.8 % Android Apple Windows BlackBerry Other Market share based on Q
3 How to successfully implement a secure mobile strategy Security is as strong as the weakest link Protecting access to applications such as m-commerce or m-banking services or access to corporate networks becomes essential. However, any security system is only as effective as its weakest link. by 2017, 50 % of employees will use their own device for work 50% Source: Gartner (August 2013) do not password protect their device Consumers and employees often use the same passwords for a multitude of professional and personal applications. By reusing the same password over and over again, they put every application containing confidential information although unwillingly and perhaps unknowingly at risk. Furthermore, mobile devices are often not password-enabled and lack the ability to authenticate users and control access to data stored on the devices. 51% 35% 60% have financial apps on their phones have shopping apps desire secure mobile authentication VASCO helps you to succesfully implement a secure mobile strategy 2
4 Added security layer with two-factor authentication Deploying an adequate security environment for every mobile device used by customers, consumers or employees is a daunting task. Furthermore, end users don t want to be burdened with laborious procedures in order to retrieve information or complete an online transaction. Two-factor authentication offers an answer to these challenges. It provides a higher level of security than traditional passwords and ensures that only authorized people gain access to sensitive information. The mobile device is then used as a second factor and can be used as an authentication device to generate a strong onetime password. This password, with a limited validity, can be generated on the device itself or can be sent via text message to the user s mobile phone. Several mobile authentication solutions to suit your needs VASCO has several solutions in its product portfolio that were developed with the mobile user in mind. DIGIPASS is VASCO s renowned technology that replaces weak static passwords with dynamic passwords that have a limited validity. Fraudsters can thus not reuse an end user s password at a later time. Additionally, VASCO s mobile solutions also provide e-signature capability to sign online transactions in all security. This e-signature will be calculated using transaction data, time and the secret stored on the mobile device. If intercepted or altered, the electronic signature will expire and the transaction will not be completed. VASCO s authentication solutions can be integrated into any existing infrastructure offering multi-platform support. You can also deploy multiple devices to secure your application enabling you to differentiate according to your authentication needs. Key benefits of mobile authentication Enhanced security Increased flexibility Excellent user convenience Intuitive use Easy upgradeable Limited impact on end user s experience Competitor differentiation thanks to authentication Increased customer trust No need to deploy hard- or software devices Low TCO 3
5 Mobile security for everyone How to secure your assets? Two-factor authentication ensures that only authorized people get access to your sensitive information, your corporate network or your online application. VASCO s mobile solutions and services: DIGIPASS for Apps DIGIPASS for Mobile Virtual DIGIPASS DIGIPASS Nano DIGIPASS powered by Intel ITP MYDIGIPASS.COM VASCO s mobile software solutions are suited for any organization that wants to provide secure remote access to its corporate network or applications. Regardless of size, VASCO offers solutions that fit your needs. Whether it is to secure your mobile banking, your e-commerce or your gaming applications or your confidential business data, all software solutions can be deployed to fit your needs. We have proven expertise and experience with approximately 10,000 customers worldwide, including 1,700 financial 4 institutions.
6 VASCO s mobile authentication solutions SDK for 360 security DIGIPASS for Apps DIGIPASS for Application Perimeter Protection SDK (DIGIPASS for APPS) is a software development kit designed to secure (mobile) applications. It offers a comprehensive set of modules giving developers all necessary building blocks to secure their application at every level. DIGIPASS for APPS enables application developers to streamline and manage the entire provisioning, deployment and lifecycle process offering several options for end user activation. Multiple devices can be used with a single license. Highlights include: Native integration of strong authentication Patented CrontoSign technology, supports an extended list of QR codes and barcodes Supports geolocalized OTPs and e-signatures Jailbreak and rootkit detection Device binding Secure storage & secure channel Out of-band login support DIGIPASS for APPS For more information, visit Software Authentication DIGIPASS for Mobile DIGIPASS for Mobile is an application that generates one-time passwords and e-signatures on the mobile device of your choice. The time-based one-time password (OTP) is a dynamic authentication code and the most effective defense against complex cyber attacks. Users will experience the freedom to conduct their business securely from a mobile device while traveling throughout the world. To enhance user convenience DIGIPASS for Mobile supports QRcodes. Users simply capture the QR-code, enter their PIN code and are instantly logged on to the application. Document or transaction signing is equally simple. The DIGIPASS for Mobile application itself is bound to device-dependent components and linked to the user with a PIN code. Therefore the applications cannot be duplicated on another phone or mobile device. For more information, visit 5
7 VA S C O s mobile authentication solutions SMS Authentication Virtual DIGIPASS Virtual DIGIPASS offers a user-friendly and cost-efficient solution for strong user authentication and e-signatures. Virtual DIGIPASS allows dynamic passwords to be sent to a user s mobile phone via SMS. The solution can be used as a primary authentication method or as backup in case an authentication device is lost or has been forgotten. This guarantees a continuity of service without requiring helpdesk support. Based on two-factor authentication - something you know and something you already have - Virtual DIGIPASS adds another layer of security to log-in functions where static passwords are still in use. For more information, visit SIM Authentication DIGIPASS Nano DIGIPASS Nano enhances the security of online service channels through the use of e-signatures and end user authentication. DIGIPASS Nano has a unique form factor and opens new perspectives in using mobile devices as an authentication means. The solution consists of a thin film that is placed on top of any SIM card enabling the phone to generate one-time passwords and e-signatures. The solution is supported by every compatible mobile phone fitted with a SIM card. Mobile users will be able to perform secure transactions, access business-critical data or transfer money anywhere at any given time. For more information, visit 6
8 VA S C O s mobile authentication solutions Visual transaction signing CrontoSign CrontoSign is an innovative patented visual transaction signing solution providing a user friendly and effective way to withstand even very sophisticated attacks by Trojan malware, targeting online banking services. The Cronto mobile application delivers the most optimal combination of usability, security and cost of ownership by allowing users to verify and sign transactions anytime, anywhere. Account holders simply scan a CrontoSign image on the bank s website with their mobile phone. Transaction details are immediately displayed on the screen of the user s mobile device. Users verify these transaction details and sign the transaction with the generated electronic signature displayed on their screen. For more information, visit Embedded Authentication DIGIPASS Powered by Intel Intel Identity Protection Technology (Intel IPT) is a two-factor authentication capability built into select 2nd Generation Intel Core processor-based PCs helping to prevent unauthorized access to important personal accounts. Intel IPT is a powerful, additional layer of security that links a PC to the online account or financial asset of a user s choice, decreasing the ability of thieves to access account information from nonassociated computers. Intel IPT helps to keep your accounts secure, even if the first layer of authentication is breached. VASCO utilizes the embedded security feature of Intel IPT from the world leader in computing innovation. This solution leverages the industry s best security on nearly every laptop and desktop in the world without the need to provision any software or hardware to the end user. The activation process is very simple and can be configured according to different specifications. 7 For more information, visit
9 VA S C O s mobile authentication solutions Native integration for mobile apps MYDIGIPASS.COM MYDIGIPASS. COM is a cloud authentication platform that allows application service providers to easily integrate strong authentication in their online services. MYDIGIPASS.COM terminates all static password vulnerabilities. Online accounts are protected with OTP technology, putting all phishing and pharming schemes to bed. The fully hosted and managed service allows organizations to focus on their core business instead of dedicating resources and investments in the set-up and roll-out of an on-premise authentication solution. MYDIGIPASS.COM now offers mobile app developers the possibility to natively integrate authentication into their mobile apps. The solution is very straightforward and convenient for the end user as the authentication process is seamlessly integrated into the mobile app itself. Users click the MYDIGIPASS.COM Secure Connect button and are automatically redirected to the MYDIGIPASS.COM mobile application where they enter their PIN code. Once this is validated by the MYDIGIPASS.COM app, the user is automatically redirected to his mobile app. The authentication process is entirely done in the back-end, invisible for the end user. For more information, visit mydigipass.vasco.com Discover VASCO s latest secure mobile application FREE DOWNLOAD Scan or click to download 8
10 VASCO BUSINESS CASE ApplicationNet puts faith in DIGIPASS software and IDENTIKEY to protect its online workspaces Objective ApplicationNet wanted to secure its online applications for employees who log on from another place than their usual office. Furthermore, companies that have signed up for ApplicationNet s online services, store all their business-critical and private data online. Therefore, a trustworthy security system had to be set up in order to guarantee the confidentiality of the information. Challenge The solution had to meet the standards for information protection that were charged by ISO and NEN, respectively an international and Dutch standard. Additionally, ApplicationNet wanted to use the address in the log-on procedure, an aspect that still needed to be developed within the company s procedures. Solution VASCO s DIGIPASS technology combined with IDENTIKEY technology, allows users of Werkplek Online to safely log on. ApplicationNet implemented both hardware - DIGIPASS GO 1 - and software authenticators - DIGIPASS for Mobile and Virtual DIGIPASS. 9 About ApplicationNet is the supplier of the service Werkplek Online (literally: Online Workspace). Its core activity is the supply of services for Online Workspace. The company offers several office applications online, such as the Microsoft Office program, Adobe or applications that are specific for one customer or another. With this service, ApplicationNet addresses organizations where IT is not a core business. The organization s size is a determining factor for Workspace Online : the solution is extremely well suited for organizations with more than 150 users. For our end users, it was of large importance that the system security was trustworthy and user-friendly. Also, they like the fact that they can choose between different kinds of DIGIPASS: a physical device, an SMS-code or an application. Logging in securely is a crucial part of our service. Maarten de Vries, Managing Director at ApplicationNet
11 VASCO BUSINESS CASE VASCO s authentication solutions help Global Radio to secure remote access and develop a long term security policy Objective Global Radio was looking for an effective, costeffective and user-friendly authentication solution to secure remote access for website content editors working from home. The solution needed not only to meet Global Radio s immediate authentication needs, but also had to be suited for future larger deployments within the company. About Global Radio is UK s largest commercial radio company and the home of many leading commercial radio brands. When searching for a strong authentication solution to secure remote access for its website content editors, Global Radio opted for VASCO s DIGIPASS technology and IDENTIKEY Authentication Server at the back-end. Challenge The company had already made prior investments, and therefore required a flexible approach with a mix of hard- and software authenticators. The solution must fit seamlessly within the existing infrastructure. Moreover, the system had to be up and running within eight weeks. Solution VASCO s IDENTIKEY Server Enterprise Edition at the back-end and a combination of DIGIPASS for Mobile, Virtual DIGIPASS and DIGIPASS GO 3 at the end user side, allowed Global Radio to quickly implement the authentication solutions within the limits of the tight deadline. The scalability and the flexibility of the solution also provide Global Radio with the opportunity to expand strong authentication to other company applications in the future. DIGIPASS for Mobile is a budgetfriendly solution: you don t have to worry about the distribution, and the authenticators can be managed centrally by the company. It is also a very user-friendly solution, as the download and employment process are very straightforward. Ross Draper, IP Infrastructure Manager at Global Radio. 10
12 VASCO BUSINESS CASE National Bank of Fujairah relies on VASCO s DIGIPASS to protect corporate applications and transactions Objective On the one hand, National Bank of Fujairah wanted to protect internal applications, such as OWA, VPN and Sharepoint. On the other hand, the bank was looking for a secure transaction solution. Challenge Ease-of-use was very important, just like the trust the solution should radiate. After all, NBF is an innovative bank that cares about its customers. Solution DIGIPASS 275 and DIGIPASS for Mobile were selected, in order to give the end user the possibility to choose his preferred authentication tool. Both solutions can generate OTPs and have a challenge/ response functionality, so user authentication and electronic signing can be executed by the same device. About National Bank of Fujairah (NBF) was incorporated in 1982 and has had a long established reputation in the areas of corporate and commercial banking, trade finance and treasury. As a leading bank in United Arab Emirates, NBF has always set great store by security and data protection. Therefore, the bank has decided to implement VASCO s DIGIPASS technology to protect its internal applications and to make sure its corporate banking users can approve transactions securely. For us, it was important to partner with a market leader that could demonstrate expertise in the financial sector. Furthermore, the availability of various models and the possibility to present two different options to our customers were important to us. Nasar Siddiqui Head of Electronic Channels at NBF 12
13 VASCO BUSINESS CASE Connection to realtime sales information for Lightplus thanks to DIGIPASS for Mobile Objective The sales team wanted to get rid of all the phone calls they had to make to gain safe access to the internal ERP-system. When they are at a customer, they need the real-time information to offer best deals and to inform them correctly. Challenge The solution had to be straightforward, without too many devices or different passwords that had to be remembered. Simplicity was the primary driver. Solution Lightplus implemented DIGIPASS for Mobile, allowing remote secure access to the ERP system without the need to carry an extra device which can easily be forgotten. In the back-end, IDENTIKEY Authentication Server was deployed, in a combination with Citrix. 13 About For ages, light has been one of the main needs for every creature, states Lightplus. The company is an authoritative Belgian importer and distributor of LED lighting and low-energy light bulbs since When on the move, the Lightplus sales team has to log on securely to the internal ERP system. However, the initial procedure proved to be time-consuming and inconvenient. To overcome this problem, Lightplus implemented strong authentication with VASCO s DIGIPASS for Mobile and IDENTIKEY Authentication Server. Our VPN-connection is now protected by strong authentication. We are happy that the access is now easy and secure. Our sales team agrees that this mobile solution was the best option. The endless phone calls to get access belong to the past. Everything has become very easy. They consider this as necessary, but confident and secure. Jo Beuls Managing Director of Lightplus
14 VASCO BUSINESS CASE Croatian Telecom uses VASCO s strong authentication to secure its Virtual Desktop Objective Croatian Telecom intended to offer a Virtual Desktop to its customers with a completely integrated security solution. They had to design a solution that would provide high security at a competitive price per month per user. Challenge The main challenge was to implement a secure but cost-effective solution that is user-friendly and would fit into the existing infrastructure. Solution Virtual DIGIPASS in combination with IDENTIKEY Authentication Server provided the perfect answer to the demands of Croatian Telecom. The solution offers an easy-to-integrate, highly secure environment and fits into the pricing policy of the company. About Croatian Telecom is a member of the T-HT Group and a leading provider of telecommunications services in Croatia. The basic activities comprise provision of telecommunications services, design and construction of telecommunications networks in the territory of the Republic of Croatia. In addition to the provision of fixed telephony services, the group also provides Internet services, including IPTV, data transmission services and GSM and UMTS mobile telephone networks. VASCO s solution is highly portable as the mobile phone acts as an authentication device. End users no longer have to worry or think about carrying around an extra device for authentication, and we don t have to worry about the distribution process of hardware authenticators. Goran Car, Director of Professional Services Division from Combis. 14
15 VASCO BUSINESS CASE Rotterdam University secures access to critical information with DIGIPASS for Mobile and DIGIPASS GO 3 and GO 6 Objective Rotterdam University was looking for a way to grant secure access to sensitive information to its employees. On top of that, the university wanted to grant a few people the ability to add, change or delete important information without impacting the existing software and application functionalities. Challenge A solution that can be easily integrated in the central login system; the Novell e-directory with NMAS, that is easy to use. After a one-time login, the employee should have access to the multiple applications and systems. Solution The University of Rotterdam employees now use VASCO authentication technology to consult or adapt important information. Employees can choose between a hardware DIGIPASS GO 3 and GO 6 or a software DIGIPASS. The back-end consists of DIGIPASS plugin for NMAS. About Employees of Rotterdam University have to log in through the central login system to get access to the different decentralized systems the educational institution works with. In order to guarantee that only employees get access to this important information such as exams and personal details, VASCO s authentication solution with one-time passwords (OTPs) was implemented. The app is installed on the employee s smartphone, so dynamic passwords can be generated on his own device. This is considered a significant advantage. The integration went smoothly, we had good support from VASCO and we went through the entire integration process without a problem. Eric Kerkdijk, ICT Supervision & Operations Manager Rotterdam University. 15
16 VASCO BUSINESS CASE Qatargas secures corporate network access by implementing DIGIPASS and IDENTIKEY into its Citrix metaframe Objective The company deployed IDENTIKEY Authentication Server Gold Edition together with DIGIPASS GO 6, Virtual DIGIPASS and DIGIPASS for Mobile. This combination allows the group to secure access to its business applications for its different target groups. IDENTIKEY works seamlessly with the various DIGIPASS solutions and requires no additional hardware investment. Moreover, the number of users over time is easy to extend thanks to the flexible licensing system. About Qatargas pioneered the liquefied natural gas industry in Qatar. Today the company is realizing its vision to deliver LNG to customers around the globe from its facilities in Qatar. With remote offices and on- and offshore plants in different locations, Qatargas was looking for a secure remote access solution allowing its employees and contractors worldwide to access its corporate network and business applications. Challenge Implement a Citrix compliant solution that secures the company s network and applications enabling remote access for executive management, remote offices and contractors. Solution DIGIPASS has leveraged the security level of Qatargas remote network and business applications through the use of dynamic onetime passwords. DIGIPASS in combination with IDENTIKEY Authentication Server is fully compliant with Citrix solutions hence providing secure remote access to the Citrix metaframe. We prefer to use software authentication devices whenever applicable to avoid the logistic challenges of delivering hardware devices to our overseas offices and plants. The fact that VASCO s solutions are reliable and simple to manage, was a decisive factor in the decision making process. Mohammed Abu-Nejim Head of Data Networks at Qatargas 16
17 VASCO BUSINESS CASE Randstad Germany uses VASCO to secure remote access Objective Replace the existing authentication solution for secure remote access to the corporate network for approximately 1,000 mobile employees. Challenge The migration had to be made quickly and on the fly, without compromising the security of the remote access solution. Solution Randstad opted for the combination of VASCO s IDENTIKEY Authentication server and DIGIPASS authenticators. As a back-up for the hardware DIGIPASS, Randstad also deployed Virtual DIGIPASS and DIGIPASS for Mobile. About To protect its sensitive data from unauthorized access, the employment agency Randstad Germany has been relying for years on a strong two-factor authentication solution to secure its remote access. When after the spring of 2011 a security issue was detected in the solution of the manufacturer at the time, Randstad decided to switch to VASCO s DIGIPASS authentication solution and IDENTIKEY Authentication Server. Availability and safety were our main priorities for our remote access solution. The concerns we had about the security of our previous solution provider prompted us to look around for alternatives We were really impressed by the possibilities and found it to be more suitable than our former solution. Stefan Gräf, Team Manager Network & Storage at Randstad Germany. 17
18 VASCO BUSINESS CASE HSBC Bank Brazil provides full integration between its electronic channels with m-banking and VASCO s DIGIPASS for Mobile Objective Enhance HSBC Bank Brazil s multi-channel approach by offering secure m-banking services to its retail customer base. Challenge To secure HSBC m-banking services, the application must be small and generic, fit for any mobile device. Furthermore, the application needs to be chip, device and telecom provider independent. Solution DIGIPASS for Mobile conveniently provides secure m-banking services anywhere, anytime. From now on, HSBC Brazil retail customers are identified through their mobile phone and social security number instead of their account number. This new method whereby the mobile phone is used as an authentication device enables customers to use their mobile phone to access HSBC services through all channels (ATM, Internet banking, phone banking) without needing to remember their account and branch number in addition to user name and password combinations. About HSBC Bank Brazil is the first bank in Brazil to offer integrated m-banking services based on VASCO s DIGIPASS for Mobile. HSBC retail customers can withdraw cash from ATMs, make transactions, money transfers and online payments using their mobile phone as an authentication device. We chose VASCO because the company is worldwide recognized as a reliable global authentication services provider. Furthermore, DIGIPASS for Mobile is a highly scalable solution with a very cost-effective maintenance and roll-out. VASCO s mobile authentication solution allows HSBC Brazil to offer its customers a highly secure yet convenient and simplified online user experience. Marcello Veronese Head of One HSBC distribution 18
19 VASCO BUSINESS CASE Insites implements VASCO s IDENTIKEY and DIGIPASS solutions to guarantee data confidentiality Objective Implement a user-friendly remote access solution that is simple to integrate. Insites wanted to grant its employees secure remote access to the network without compromising data confidentiality. Challenge The authentication solution needed to be costefficient, user-friendly, flexible and compatible with the Citrix XenApp / XenDesktop network. About Insites Consulting is a global online market research company, known for its creative research solutions and specialized in communication and storytelling. Headquartered in Belgium, Insites also has offices in the United Kingdom, the Netherlands and Switzerland. Gathering large amounts of confidential data, the company was in need of a security solution enabling secure remote access to its network data through a VPN portal. Solution Insites deployed VASCO s DIGIPASS GO 3, GO 6 and in a later phase, DIGIPASS for Mobile in combination with IDENTIKEY Authentication Server. This userfriendly solution was very simple to implement and ensures secure remote access to the Citrix XenApp / XenDesktop network for Insites employees. 19 We wanted to implement a solution that not only would secure access to our business-critical data, but that also allowed us to allocate different users to one user account. We decided to deploy DIGIPASS for Mobile and to offer our employees an even greater flexibility as everyone possesses a mobile phone and consequently always carries his DIGIPASS with him. Gunter Van de Velde IT manager at Insites
20 VASCO BUSINESS CASE Picanol Group implements IDENTIKEY Gold Edition in combination with DIGIPASS technology to secure access to the company s network Objective The Picanol Group wanted to implement a complete solution for its vendors, consultants and external collaborators to secure internal and external access to its various business applications. About The Picanol Group is an international, customer-oriented group that specializes in the development, production and sales of weaving machines and other high technology products, systems and services. Challenge The company wanted a solution that could be implemented in phases and would be easy to expand. The solution eventually will be extended to not only secure remote access to applications, but also internal confidential information without the group needing to make additional investments in a later phase. Solution The company deployed IDENTIKEY Authentication Server Gold Edition together with DIGIPASS GO 6, Virtual DIGIPASS and DIGIPASS for Mobile. This combination allows the group to secure access to its business applications for its different target groups. IDENTIKEY Authentication Server works seamlessly with the various DIGIPASS solutions and requires no additional hardware investment. Moreover, the number of users over time is easy to extend thanks to the flexible licensing system. We wanted a solution that would be available to suppliers, consultants and people with or without a mobile company phone. Therefore we decided to deploy different types of DIGIPASS devices. This solution gives us the additional flexibility that we need. Bart Lagast System Engineer at the Picanol Group 20
21 MOBILE CUSTOMER QUOTES We are thrilled to partner with VASCO, says Jean-Louis Van Houwe, CEO of Monizze. We offer our customers elaborate payment solutions without compromising security. VASCO has built a worldwide reputation as a specialist in securing banking applications. By integrating VASCO s innovative and renowned technology into our web applications, we give our users the fundamental trust to use our online services in a secure manner without being oblivious about user-friendliness. Mobile Facts Thinfactory was eager to offer its Cloud Plaza users a two-factor there authentication will be 2.1 solution billion with banking level security. In VASCO we found a trustworthy partner that could mobile supplement phones our worldwide service offerings by 2017 with its DIGIPASS as a Service. Its ease of use, scalability and high level of security are only some of the advantages that were decisive for us, says Johan Verhaeren, Head of Sales and Marketing at Thinfactory % 14.2 % Android Apple 3.3 % Windows Marcello Veronese, Director of Digital Channels at HSBC, says; The enhancement of this broader DIGIPASS for Mobile deployment is the result of more than five years of research and development. We wanted to 2.7 % ensure that our customers would profit from an innovative and easy-to-use authentication solution, not only BlackBerry in Brazil, but also worldwide. Thanks to the partnership with VASCO, we created a state-of-the-art solution. It s a significant advantage for the Brazilian market where cards with static passwords are still widely in use 0.8 % Other Market share based on Q
22 Mobile devices are omnipresent in today s enterprise ecosystem, says Payam Moini Tabatabai, Founder & CEO of MOBYLLA. However, regulations may differ from country to country. We need solutions that are compliant with national regulations in different countries. Additionally, we wanted to implement a security solution that doesn t compromise user-friendliness which is essential for any mobile platform. Users will be reluctant to follow complicated processes on any mobile platform. VASCO s MYDIGIPASS.COM native authentication solution proved to be the ultimate solution. We are able to offer our customers the best authentication solution combining high security and an unmatched user convenience. We make it a priority to continuously improve our service, states Danilo Cattaneo, InfoCert s Director General. By integrating MYDIGIPASS.COM into Legalmail we can offer double added value to our customers, Source: Gartner (August 2013) increase access security and provide even greater convenience and satisfaction in the use of our products. by 2017, 50 % of employees will use their own device for work 50% do not password protect their device Thanks to the cooperation with VASCO, we can offer our customers an extra layer of security, so that their 51% have financial personal data is better protected, apps says on Serge their Van de Zande, founder of Ello Mobile. The implementation of phones an in the cloud authentication platform fits perfectly in our web-based strategy. 35% have shopping apps 60% desire secure mobile authentication Trust is a high value in our business club, says Business Club Bavaria President Kajetan Brandstätter. On VASCO helps you to succesfully the Internet, it is very easy to misuse trust. All too often, fraudsters steal access codes and then use the implement stolen identity a as secure their own. The mobile reputation strategy damage for our business club in that case would be tremendous. We are the first business club to offer our members a real workable and safe security concept. 22
23 Request more information: Copyright 2014 VASCO Data Security, Inc, VASCO Data Security International GmbH. All rights reserved. VASCO, CertiID, VACMAN, IDENTIKEY, axsguard, DIGIPASS, the logo and the logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc. and/or VASCO Data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights in the U.S. and other countries. Other names may be trademarks of their respective owners. BR v3 /digipassbyvasco /VASCODataNews /user/vascodatasecurity10 blog.vasco.com
Make it Mobile. How to successfully implement a secure mobile strategy. www.vasco.com
Make it Mobile How to successfully implement a secure mobile strategy www.vasco.com Make it Mobile The mobile revolution is unstoppable. Mobile devices are proliferating in today s personal and professional
Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security
Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use
VASCO Consulting Services
VASCO Consulting Services OVERVIEW OF ALL VASCO CONSULTING SERVICES 1. VASCO Consulting Services BEFORE your implementation S trong authentication for e-banking: overview and best practices Two-factor
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Strong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter
INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
White Paper. The Principles of Tokenless Two-Factor Authentication
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
IDENTIKEY Server DIGIPASS BY VASCO. VASCO s next generation authentication server
IDENTIKEY Server VASCO s next generation authentication server DIGIPASS BY VASCO The world s leading software company specializing in Internet Security VASCO Data Security SECURE YOUR BUSINESS Nowadays,
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Securing Virtual Desktop Infrastructures with Strong Authentication
Securing Virtual Desktop Infrastructures with Strong Authentication whitepaper Contents VDI Access Security Loopholes... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
DIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
BlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
axsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
How To Use Uniflow
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE KEY BENEFITS
BROCHURE MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE Delivering effective collaboration amongst employees, partners and customers is a critical driver to the
IDENTIKEY Authentication Server
IDENTIKEY Authentication Server VASCO s next generation authentication server DIGIPASS BY VASCO The world s leading software company specializing in Internet Security VASCO Data Security We authenticate
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
When Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Channel Partner Marketing Toolkit
Channel Partner Marketing Toolkit Enabling the VASCO Channel to successfully market and sell the VASCO strong user authentication and e-signature solutions The world s leading software company specializing
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Hyper-V Installation Guide. Version 8.0.0
Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
The complete solution for enabling BYO. www.citrix.com
The complete solution for enabling BYO Solution Brief The complete solution for enabling BYO www.citrix.com Companies of all sizes are witnessing a transformation in the types of devices entering the workplace,
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Secure your business BY VASCO DIGIPASS. The world s leading software company specializing in Internet Security
DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Corporate profile We authenticate the world VASCO is a leading supplier of strong authentication and e-signature
Hosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
www.eset.com Proven. Trusted.
www.eset.com Proven. Trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE
BROCHURE MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE Effective collaboration among employees, partners and customers is a critical driver of any organization
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Best Practices for Enterprise Mobile Printing
Micro Focus iprint Best Practices for Enterprise Mobile Printing Mobility is changing the way people do everything. Today s workers are constantly on the move and armed with apps often unsanctioned by
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
One platform for all your print, scan and device management
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
Guide to building a secure and trusted BYOID environment
e-healthcare e-gaming e-insurance e-commerce e-banking e-government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media
Modernize your business with Citrix XenApp 7.6
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Ultra-strong authentication to protect network access and assets
Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.
Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser
Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
How To Use Mitel Micollab
BROCHURE MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE Effective collaboration among employees, partners and customers is a critical driver of any organization
