1 Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life.
2 Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware Solution... 4 Traitware PhotoAuth... 5 The Traitware App / Traitware ID... 6 User-Device Registration... 7 Using Traitware to Login... 8 QR-Login... 8 Single-Device Login... 9 Push-to-Login... 9 The Traitware Service... 9 Summary Acuity Systems ( ) Page 2
3 Online Security -- Safe or Easy, But Not Both? The December 2012 issue of Wired magazine featured the cover story Kill the Password: Why a String of Characters Can t Protect Us Anymore. The author of the article, Matt Honan, had his digital life hijacked: This summer, hackers destroyed my entire digital life in the span of an hour. My Apple, Twitter, and Gmail passwords were all robust seven, 10, and 19 characters, respectively, all alphanumeric, some with symbols thrown in as well but the three accounts were linked, so once the hackers had conned their way into one, they had them all. 1 The article s punch line states the opportunity very clearly: The age of the password has come to an end; we just haven t realized it yet. And no one has figured out what will take its place. 2 The world is going online, and fraud and identity theft are on the rise. Worldwide unit sales are expected to reach 500M for smartphones 3 and 120M for tablets in 2012, with a projected yearover-year growth rate of over 50% for both 4. More importantly, easy access to computing devices of all types is driving the explosion of online apps for every function you can imagine (and many not even envisioned yet) including online banking, payment services (e-wallet), loan applications, real-time health monitoring, electronic ticketing, electronic identity cards and so on. The problem is that most current online systems are still largely dependent on legacy user authentication via username and password, which can result in identity theft, fraud, financial risk, and increased friction for the end user. Strong user authentication is an important component in any solution seeking to address these issues. The most common form is two-factor authentication (2FA), which requires two or more of the following factors to be presented when a user logs in to a protect site: 1) a knowledge factor ("something you know ); 2) a possession factor ("something you have"); and 3) a biometric factor ( something your are ). Typical 2FA solutions have consisted of hardware tokens, key fobs, smartcard tokens, one-time passwords (OTP), biometric readers (fingerprint readers), etc. These solutions have been widely deployed mostly in larger companies to protect enterprise applications. However, two-factor authentication solutions, while significantly improving security have not been widely adopted outside of large enterprises due to inconvenience, complexity and high cost. When it comes to online security the traditional wisdom has been you can make it safe, or you can make it easy to use, but you can t do both. 1 Wired: 2 Ibid 3 Strategy Analytics: 4 Gartner: Acuity Systems ( ) Page 3
4 The Traitware Solution Traitware is a next generation, patent-pending two-factor authentication platform, which is both secure and easy to use, and can be deployed at a low cost in both consumer and enterprise applications. 5 Traitware takes advantage of the proliferation of smartphones by creating a robust and innovative smartphone-as-a-token method of strong, two-factor user authentication. Compared to other solutions, Traitware is unique in several ways that it approaches the knowledge factors used to authenticate the user, as will be described below. The Traitware solutions consists of three major components which work together seamlessly to add strong, personalized user authentication to almost any online system or application: Traitware PhotoAuth: PhotoAuth is a new, innovate security method, which requires the user to select a sequence of images on their smartphone to unlock the Traitware App. PhotoAuth is both more secure and easier to use than traditional numeric PIN codes and forms the second factor in the Traitware strong authentication solution the something you know factor. The PhotoAuth feature is seamlessly integrated into the Traitware App and Traitware Service. Traitware App: The Traitware App installs on the user s Apple or Android smartphone allowing it to function as a personalized security token, which is bound to the user s validated identity. The Traitware App, together with the user s smartphone, functions as the first factor in the Traitware strong authentication solution the something you have factor. The Traitware App can function as a standalone App or the Traitware authentication functionality can be integrated into a customer s existing mobile app. Traitware Service: This is the back-end component of Traitware, which handles the authentication process and the interface with the web application or other service being protected by Traitware strong authentication. The Traitware service can be hosted in a secure private cloud or can be integrated into the customer s web application. The Traitware Service uses a simple set of RESTful APIs to allow easy integration into the customer s web application or web-based service. The following sections provide more details about how the Traitware strong authentication solution works, and also describes other optional features including the QR-Login and Clickto-Login features. 5 Several Patents on Traitware technologies including the device-user signature and PhotoAuth are pending Acuity Systems ( ) Page 4
5 Traitware PhotoAuth A patent-pending Traitware feature called PhotoAuth provides Traitware with the something you know authentication factor. The PhotoAuth Key consists of a sequence of user-selected images, which form a visual key which must be selected by the user on their Smartphone to unlock the Traitware protected App when it launches. If the user fails to select the correct image sequence (which is pre-selected by the user during the Registration process), the Traitware protected App is not unlocked and the smartphone cannot be used to authenticate the user. PhotoAuth is both safer and easier to use than traditional PIN codes often used for this purpose. The user selects their personal PhotoAuth Key sequence during the device registration process. The PhotoAuth Key can be configured as either 4, 5 or 6 images, which the user selects from a set of 24, 48 or 72 images. The Key Length and Set Size can be configured on a per-user or perapplication basis according to the level of security required. The total pool of available PhotoAuth images number in the thousands, but the user only sees a fixed set of 24, 48 or 72 images. As the following statistical table illustrates, even at the lowest-strength setting of 4 images out of a set of 24 possible images, this provides 33 times more entropy than a 4-digit numeric PIN code. At the maximum security setting, PhotoAuth provides 139,000 times more entropy than an equivalent numeric PIN. This setting can be easily configured to the level of security appropriate to the application being protected, and can even be changed on a per-user basis. PhotoAuth Key Length PhotoAuth Set Size PhotoAuth Key Entropy as 1-chance-in-XXXX Entropy compared to equivalent Numeric PIN , times the entropy of a 4-digit PIN ,308, ,873,856 2, ,962, times the entropy of a 5-digit PIN ,803,968 2, ,934,917,632 19, ,102, times the entropy of a 6-digit PIN ,230,590,464 12, ,314,069, ,314 Table 1: PhotoAuth Key Entropy Statistics Compared to a Numeric PIN The following sample image from the Traitware App shows the PhotoAuth unlock screen. This screen is presented to the User when they launch the Traitware App: 2014 Acuity Systems ( ) Page 5
6 Figure 2: Sample PhotoAuth Unlock Screen Because PhotoAuth uses easily remembered images instead of numeric or alphanumeric codes, it is more convenient for the user and safer due to the larger entropy of the PhotoAuth Key. The Traitware App / Traitware ID Human beings have highly developed recognition skills, which allow them to recognize certain physical and behavioral attributes of other individuals and instantly distinguish one person from another. Further, we subconsciously store characteristics of those individuals in our memory in order to recognize them again based on those attributes. As we get to know them we can connect names, voice traits, visual keys and other individual traits to those individuals and learn to recognize them almost instantly. Additionally, there are other traits that do not depend on physical, or behavioral characteristics. For example, artists, writers and musicians can often be identified by the tone, character, or structure of the works they create because of the uniqueness of their interaction with the media in which they work. In our digital age, this same interactive effect comes into play in how we use our smartphones and other digital devices. It turns out each person ends up creating a dynamic digital fingerprint which is a highly differentiated, personalized, digital representation of their actual identity. The Traitware App takes advantage of this fact by using the digital fingerprint contained on the user s smartphone as one of the factors in our two-factor authentication process. The App uses this digital fingerprint consisting of various user and device traits to create a Traitware ID which uniquely identifies the user-device combination to a very high degree of certainty. Figure 3 contains a list of some of the traits derived from the smartphone device by the Traitware App and which make up the Traitware ID token Acuity Systems ( ) Page 6
7 Device Traits MAC address Device Type (Apple iphone or Android) Screen Resolution Device Name Mobile Country Code (mcc) Mobile Network Code (mnc) Other hardware traits as available User Traits Address Book Contact names Address Book Contact phone numbers Song Titles Other user traits as available Table 3: Traitware Device and User Traits These device-user uniquely identify the smartphone as belonging to the user, are used to generate the Traitware ID electronic signature, which represents the unique user-device pairing. Please note that for security and privacy reasons, personal data is never transmitted off of the device. Only a salted, hashed and truncated representation of this data is transmitted to the Traitware Service for future authentication purposes. The uniqueness of this digital signature allows Traitware to determine if a given signature came from a specific device-user pair at the time the user is authenticated by the system. Statistics show that these trait signatures can be used to uniquely identity each device-user pair to an accuracy exceeding %, or 1 in 390 billion, a number much larger than the current human population. User-Device Registration Using Traitware starts with the user installing the Traitware App on their Apple or Android smartphone device. The App can be installed from a public store (App Store or Google Play) or from a private distribution source. A link to install the App can also be sent to the user via an SMS or message. Note: The Traitware App functionality can also be integrated into a customer s mobile app to add strong authentication to an existing app. After installing and starting the App on their smartphone, the user is prompted to enter a onetime-use Registration Code which is required to register the user-device pairing. This code can be supplied to the user in a number of ways by the issuing company such as sending it to a validated mobile phone number via SMS or via a validated address. The Traitware registration process, including the use of the customer s corporate LDAP or AD-based directory service or a public IA provider such as Experian, can also support other forms of Identity Assurance (IA). Next, the user is prompted to select their personalized sequence of 4, 5 or 6 images, which make up their PhotoAuth Key which is used to later on to unlock the Traitware App. The PhotoAuth Key functions as the something you know factor in the Traitware two-factor authentication 2014 Acuity Systems ( ) Page 7
8 process. Please note that the actual PhotoAuth Key sequence is never transmitted off of the device. A hash for the PhotoAuth Key is transmitted instead and stored by the Traitware Service. Because of the high entropy of the PhotoAuth Key, even if the hash was stolen, it would be virtually impossible to reverse it and produce the original PhotoAuth Key using a dictionarylookup or other cracking method. The App now registers the user-device pairing with the Traitware Service. The App fingerprints the user s device to collect the user and device traits as explained above. These traits are never transmitted off of the device but instead function as inputs to a hashing algorithm, which produces the Traitware ID which uniquely identifies the user-device combination as one of the two authentication factors. Once the user-device pairing has been registered with the Traitware Service, the user can now employ their smartphone with the Traitware App installed as a secure login token as described in the next section. Using Traitware to Login Once the user-device has been registered, the user can securely access a Traitware-protected web application using their smartphone as a login token as described below. There are several ways in which this can be accomplished depending on how Traitware is integrated into the customer s application and how the device is used. QR-Login The most interesting and useful of the login methods supported by Traitware is called QR-Login which works as follows: From a web browser on any Internet-connected terminal device (PC, Mac, tablet, set-top box or other) the user navigates to the login page for the web application protected by Traitware. The site displays a QR code, which uniquely identifies the web session/instance. (the QR code is generated by the Traitware Service) The user launches the Traitware App on their smartphone and enters their PhotoAuth key to unlock the App. The App transmits the Traitware ID token to the Traitware Service, which authenticates or denies access for the user. Using the Traitware App, the user scans the QR code displayed on the web terminal. The App transmits the QR code to the Traitware Service. Scanning and transmitting the QR code associates the web application with the authenticated device-user pair. The user is now automatically and securely logged into the Traitware-protected site without a username or password being entered. The user can now use the web application or service, conduction transactions, etc Acuity Systems ( ) Page 8
9 Single-Device Login If the user wants to login to a secured web application directly from their smartphone s browser instead of from a separate device, the Single-Device Login method applies: The user navigates to the web application login page from the browser on their smartphone and clicks on a Traitware Login button or link. The link on the web page invokes a web method, which launches the Traitware App on the smartphone. The Traitware App prompts the user to enter their PhotoAuth Key then transmits the Traitware ID to the Traitware Service, which then authenticates the user. The Traitware Service notifies the web application that the user is authenticated and the application logs the user into the web application. The user can now use the web application or service, conduct transactions, etc. from their smartphone. Push-to-Login Another method supported by Traitware is called Push-to-Login and can be used when it s not practical or desirable to scan a QR code from a web page: From a web browser on any Internet-connected terminal device (PC, Mac, tablet, set-top box or other) the user navigates to the login page for the web application protected by Traitware. The user enters a login name or address in the terminal, which uniquely identifies the User (no password), then clicks on the Submit or Login button on the web application page. On the back end, the web application notifies the Traitware Service via an API call that the specified user is attempting to login. The Traitware Service then sends a push notification to the user s smartphone to verify the login request. The user accepts the login verification by pressing the Push to Login button on the push notification screen. This launches the Traitware App, which prompts the user to enter their PhotoAuth key to unlock the App. The App transmits the Traitware ID token to the Traitware Service, which authenticates the user and logs them into the web application by returning a login approved message to the calling web application. The user can now use the web application or service, conduction transactions, etc. The Traitware Service The Traitware Service is the back-end software component, which handles the authentication process and the interface with the web application being protected by Traitware strong 2014 Acuity Systems ( ) Page 9
10 authentication. The Traitware Service software can be hosted in a secure private cloud or can be integrated into the customer s web application. The Traitware Service exposes a simple set of RESTful APIs to allow easy integration with the customer s web application or web-based service. The Traitware Service uses several techniques to provide a secure and reliable authentication process designed to prevent common threats: Cryptographic signing of all data sent between the Traitware App and the Traitware Service using asymmetric key cryptography (public/private key pair) to verify the authenticity of each message and prevent man-in-middle types of attacks. Cryptographic signing of the Traitware App itself prevents it from being spoofed at a functional level. The PhotoAuth Key and Traitware ID codes are transmitted and stored only as complex salted hashes so that no private user information is ever transmitted off of the smartphone or stored by the Traitware Service. The Traitware solution also includes a back-end component called the Traitware Administration Console (TAC) which is a secure web portal used by a system administrator to configure and monitor the Traitware Service. Summary Identity fraud, cyber theft and other threats create tremendous liabilities for companies providing services on the Internet and erode consumer confidence in online services. Despite the increased digital power at our disposal, online security is still grossly inadequate because most systems are still heavily dependent on the antiquated username/password paradigm. This must change in order to avoid a continual degradation of this situation. While not a silver bullet for this problem, strong, multifactor user authentication has been proven to be a significant part of the solution as it plugs a major hole in the wall. The problem with traditional multifactor authentication solutions is that they have been designed for use by large enterprise customers, which tend to be complex and cumbersome for the end user. Leveraging the widespread deployment of smartphones which can be used as personal authentication devices, the Traitware solution provides a safe and simple to use strong authentication system which can be easily integrated into almost any customer application or system Acuity Systems ( ) Page 10
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com firstname.lastname@example.org 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
+1-888-437-9783 email@example.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
SMS PASSCODE 2014 Table of Contents Configuring SMS PASSCODE for soft tokens... 3 Pre-requisites... 3 Enabling token support in SMS PASSCODE... 3 Creating a Token Policy... 3 Create a new User Group Policy
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Security and Usability David Hunt: DCH Technology Services A Financial Services View Active Security Passive Security Technologies Impact on Users Big Data Consumer context, do we know you? Active Security
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Table Of Contents WELCOME TO PASSWORD BOSS!.... 2 PASSWORD BOSS: A SMARTER WAY TO STAY SECURE ONLINE....3 HOW PASSWORD BOSS PROTECTS YOUR SECURITY AND PRIVACY.... 5 INSTALLING PASSWORD BOSS AND CREATING
Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, firstname.lastname@example.org A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
Trust Elevation Using Risk-Based Multifactor Authentication Cathy Tilton 1 Caveat Intent is to present an approach for risk-based multifactor authentication and how it might be used in a trustelevation
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Trends in cloud computing, workforce mobility, and BYOD policies have introduced serious new vulnerabilities for enterprise networks. Every few weeks, we learn about a new instance of compromised security.
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
Two-Factor Authentication The two-factor authentication system provides an additional level of security when signing in to Ryerson web applications via Ryerson s Central Authentication Service. When you
Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...