Ericsson Mobile digital identity
|
|
|
- Lizbeth Skinner
- 9 years ago
- Views:
Transcription
1 Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity
2 Ericsson s identity Vision Every mobile phone number can be a Trusted digital ID Every mobile device is a Digital Wallet and ey part in the Networked Society Vision We must enable Simple & secure access to the largest possible set of services Pedro Calderon Ericsson Confidential Page 2
3 What is Ericsson MDI? Pedro Calderon A solution to converts every mobile device into a mobile digital ID Mobile Operators validate credentials and protect identity Simplifies access from any device to online resources Anywhere, anytime, any device Converts operators into Trusted Identity Providers Different levels of assurance (LoA1 to LoA4) for both SIM & non SIM-based services Pedro Calderon Ericsson Confidential Page 3
4 What are the use cases? Pedro Calderon Ericsson Confidential Page 4
5 Architecture for MCX Accelerator E-Gov Banks MDI Cloud based components User Portal SP Portal Discovery & Resolution MDI Cloud Gateway E/// API MDI Operator Cloud Components DB App. Server. MCXP / MCXS DB App. Server MCXP / MCXS Operator Authenticators SMS-C USSD BIOMETRICS SMS-C USSD BIOMETRICS AFG AFG Pedro Calderon Ericsson Confidential Page 5
6 identity players today Google + 300M MAU Facebook 1,35B MAU Mobile Operators 4.65B MAU Pedro Ericsson Calderon AB 2014 Ericsson Confidential Page Page 6
7 Identity model Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 7
8 99% of services Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 8
9 Gsma mobile connect Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 9
10 Bank and gov id Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 10
11 Mobile digital identity supported cases Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connec t O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 11
12 Business, trust & simplicity MDI and the Mobile connect move Simple User Interface Pedro Calderon End-User Profile Management MNO LOGO Branding Space Featured Applications Connected Applications Permissions Management per App Pedro Calderon Ericsson Confidential Page 12
13 WherE is the business case For MOBIle ID & eid?
14 Pedro Calderon Ericsson Confidential Page 14
15 3 elements for a strong BC Paid authentication Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 15
16 authentication Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 16
17 levels of assurance Level of Assuran ce Confidence in Asserted Identity Authentication Factors LoA1 Little or no confidence Single Factor Authentication Something I Know Options for Authentication N/A MDI leverages on the possession of a mobile device Social Apps LoA2 Some confidence Single Factor Authentication Something I Have LoA3 High confidence Multi-Factor Authentication: Something I Have Something I Know SMS + URL USSD Smartphone App Idem on LoA2 plus PIN or Password MDI 1.X LoA4 Very high confidence Multi-Factor Authentication: Something I Have Something I Know + PKI for Digital Signature Idem on LOA3 plus PKI MDI 2,x Pedro Calderon Ericsson Confidential Page 17
18 Pedro Calderon Ericsson Confidential Page 18
19 Freemium model High volume (above threshold) Low volume (below threshold) paid free paid free paid LOA2 LOA3 LOA4 Pedro Calderon Ericsson Confidential Page 19
20 Promoting services Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 20
21 Key Take-Aways MDI leverages on the possession of a mobile device to provide multi-factor authentication What I have (Mobile device) What I know (Password, PIN, etc..) What I am (Biometrics and more on research) Offers a Full range of Authentication, Identification and Authorization levels MDI 1.0 is 1 st Global GSMA Mobile Operator Compliant solution in the market Pedro Calderon Ericsson Confidential Page 21
22
23 Promote your own services fast development of ecosystem Pedro Calderon Ericsson Confidential Page 23
24 From Discovery to Recommendations Pedro Calderon Ericsson Confidential Page 24
25 Attribute brokerage Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 25
26 Attribute brokerage Seamlessly needed when there is 1 to Many relationships (e.g. Between an app and identity sources) website or app Company A user database Company B user database Company C user database Pedro Calderon Ericsson Confidential Page 26
27 examples MCX Pedro Calderon Ericsson Confidential Page 27
28 Pedro Calderon Ericsson Confidential Page 28
29 Mobile apps & MOBIle connect Pedro Calderon Ericsson Confidential Page 29
30 Pedro Calderon Ericsson Confidential Page 30
31 Pedro Calderon Ericsson Confidential Page 31
How To Build A Digital Business From The Ground Up
Powering Business Value and Seamless Experiences GSMA Mobile Connect Accelerator and API Exchange by Apigee Apigee Digital Value Chain for Network Operators and Service Providers APP DEVELOPER Wants to
Mobile Financial Services
Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity
Mobile Connect & FIDO
Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator
Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box
Frans Bolk CEO UniQ-ID
Frans Bolk CEO UniQ-ID Uses certificates ( x.509) Has its own UniQ-CA ETSI Level of Security LoS5 ( Common Criteria EAL5+) ISO29115 and ISO29003 Level of Assurance LoA 4, and 3, and 2 ( STORK4+, and 3,
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
Identity and Access Management for the Hybrid Enterprise
Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver
A RADICAL NEW OPEN SOURCE Mobile Connect Accelerator (MCX) GSMA Approved Solution
A RADICAL NEW OPEN SOURCE Mobile Connect Accelerator (MCX) GSMA Approved Solution WHY WSO2.TELCO? The ONLY company to ever build a complete 100% open source middleware stack on premise, in the cloud and
Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Secure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08
Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this
How to enroll Android devices in SoMobile. Content Introduction... 1 Prerequisites... 1 Enrollment... 2
How to enroll Android devices in SoMobile Content Introduction... 1 Prerequisites... 1 Enrollment... 2 Introduction This document provides a detailed step-by-step to enroll your Android device in the SoMobile
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
Mobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Made for MSPs by an MSP
Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
CSS CORP SMART MOBILITY SERVICES
Mobility Services Mobility Services As handheld devices and next generation service provider networks enable rich, real time user experiences, mobility is fast emerging as a critical component of enterprise
QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1
QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,
OIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
Microsoft Office 365 from Vodafone. Do business virtually anywhere
Do business virtually anywhere Now there s an easy way to do business virtually anywhere 2 Microsoft Office 365 from Vodafone is helping to empower people to work the way they want, on their terms, from
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
EBA STRONG AUTHENTICATION REQUIREMENTS
EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Ariba Supplier Mobile App Quick Start Guide
Ariba Supplier Mobile App Quick Start Guide Table of Contents Getting Started...3 Downloading and Authenticating Your App... 3 Using the Ariba Supplier Mobile App...6 Logging In... 6 Setting Up Alerts
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Mitel Performance Analytics
Mitel Performance Analytics For Enterprises May 2016 Summary Mitel Performance Analytics: Service Quality Matters MPA Plus: Advanced Enterprise Features Fault & Performance Management Features MPA Service
Strong authentication. NetIQ - All Rights Reserved
Strong authentication NetIQ - All Rights Reserved Agenda Strong authentication Demo 2 Questions about Identification / Authentication What is authentication? Identity verification, are you who you say
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, [email protected] IT-Concern John Marcum Enterprise Client Management Architect / [email protected]
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Samsung SDS. Fast IDentity Online
Samsung SDS Innovating User In the era of Digital Convergence In the coming era of digital convergence, user authentication is becoming increasingly important as a gateway to the digital world. Companies
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
User Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
i-mobile Multi-Factor Authentication
i-mobile Multi-Factor Authentication Introduction... 1 i-mobile Multi-Factor Authentication... 1 i-mobile WAP MFA Enrollment... 2 i-mobile Application MFA Enrollment... 4 Error Conditions and Resolutions...
Employee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5
Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5
Role of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 [email protected] *: In collaboration with colleagues from
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
DIGITAL LIFE E-GUIDE How to Protect your Smartphone
A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money
Self Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
Modern Multi-factor and Remote Access Technologies
Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1 Agenda Problem and solution
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
The Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
AWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
MONETIZING THE MOBILE APP. A Light Reading Webinar Sponsored by
MONETIZING THE MOBILE APP A Light Reading Webinar Sponsored by TODAY S PRESENTERS ANDY GRAY Moderator Heavy Reading CASSIDY SHIELD Head of Global Marketing Content, Cloud, Communications 2 AGENDA 1. Service
Location Based Services for Enterprise
Location Based Services for Enterprise Introduction WHITEPAPER Location Based Services (LBS) have been making foray into enterprise applications, thanks to the rise in smartphone ownership and the phenomenal
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton
Trust Elevation Using Risk-Based Multifactor Authentication Cathy Tilton 1 Caveat Intent is to present an approach for risk-based multifactor authentication and how it might be used in a trustelevation
Content Delivery Service (CDS)
Content Delivery Service (CDS) Xyleme delivers content management for learning and development. We transform the way you author, publish, deliver, and analyze learning content to drive business performance.
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
VIDEO INTEGRATION. ipad video meetings from within your CRM has never been easier.
VIDEO INTEGRATION ipad video meetings from within your CRM has never been easier. At SuiteBox we have strived to make this integration clean and simple, with only 4 touchpoints with your CRM. Only 1 API
Rich Communication Suite Enabler. plus integration with your existing VoIP services
Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.
