NOK NOK LABS AUTHENTICATION & OTT SERVICES
|
|
- Kerrie Horton
- 8 years ago
- Views:
Transcription
1 NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1
2 NOK NOK LABS The authentication challenge
3 A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME... NOK NOK LABS 3
4 A DILEMMA...WE CANNOT REALIZE THE FULL POTENTIAL OF THE CLOUD, MOBILITY OR E-COMMERCE. NOK NOK LABS 4
5 IDENTITY & AUTHENTICATION Single Sign-On Federa-on Authen-ca-on User Management Physical- to- Digital Iden-ty NOK NOK LABS Iden-ty Services 5
6 THE HUMBLE IGNITION KEY NOK NOK LABS 6
7 THINGS ARE CHANGING Convenience, Security, Personalization Attacks First Steps Next Steps Sony 77 M Evernote 60 M Rockyou 32 M LinkedIn Yahoo Twitter 6.5 M 450 K 56 K Apple Evernote Facebook Twitter Google? NOK NOK LABS 7
8 NOK NOK LABS Reality Check
9 HOW ARE WE DOING? USERS FRUSTRATED 25 ACCOUNTS 8 LOGINS / DAY 6.5 PASSWORDS ORGANIZATIONS OVERWHELMED $7.2M / DATA BREACH $15 / PASSWORD RESET $ / TOKEN ECOSYSTEMS INHIBITED FRAGMENTED INFLEXIBLE FRICTION EVERYWHERE NOK NOK LABS 9
10 THE AUTHENTICATION TOWER OF BABEL? Silos, proprietary, privacy, reliance on 3 rd party, tolls NOK NOK LABS 10
11 NOK NOK LABS Towards a Solution
12 AUTHENTICATION: MISSING PIECE OF THE CLOUD, MOBILE & INTERNET OF THINGS 75% OF THE DIGITAL UNIVERSE CREATED, CAPTURED OR REPLICATED IN THE CLOUD INCREASING USE OF INTERNET OF THINGS US ECOMMERCE PROJECTED AT $325BN BY BN MOBILE DEVICES MORE THAN THE EARTH S POPULATION 3.1 TRILLION HARD DRIVES WORTH OF DATA CONSUMED DAILY IN THE US EXPLOSION OF ONLINE DATA ABOUT PEOPLE & THEIR ACTIONS = MORE KNOWLEDGE OF WHAT MAKES US UNIQUE NOK NOK LABS 12
13 WHAT IS NEEDED COMMON AUTHENTICATION PLUMBING Usable Authentication Users Open Standard Plug-In Approach Interoperable Ecosystem Devices Cloud/ Enterprise Federation 13
14 IMPLEMENTATION CHALLENGE A PLUMBING PROBLEM: SHADES OF RUBE GOLDBERG Organizations Applications Authentication Methods RP 1 RP 1 App 1 Silo 1 Silo 2 App 2 New App Silo 3 Silo N?? NOK NOK LABS 14
15 UNIFIED STANDARDS & AUTHENTICATION AGILITY ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. Organizations Applications Authentication Methods RP 1 RP 1 App 1 FIDO UNIFIED STANDARDS App 2 New App? NOK NOK LABS 15
16 ADDRESS USABILITY & DIVERSITY Usability Drives Usage No passwords Existing devices Flexible authentication Engagement Completed transactions Security compliance NOK NOK LABS 16
17 THE OTHER HALF OF THE EQUATION PASSWORDS SSO/FEDERATION SAML STRONG AUTH OpenID Recreated PMS First Mile Second Mile NOK NOK LABS 17
18 MULTIPLE IMPLEMENTATIONS AVAILABLE No Secure HW FIDO SDK Secure Crypto + Storage Secure Execution Environment User Space UX Layer Input, Display Crypto Layer FIDO SDK UX Layer Input, Display FIDO SDK Secure Hardware Crypto Layer UX Layer Input, Display Crypto Layer NOK NOK LABS
19 A PEEK INTO MODERN AUTHENTICATION EXPLICIT AUTHENTICATION IMPLICIT AUTHENTICATION NOK NOK LABS 19
20 IDENTITY SOLUTION PATTERNS WHICH WILL PREVAIL? User-Centric Relationship-Centric Trust-Me-Me-Me Regulation-Centric 20
21 ONE-SWIPE, ONE-PHRASE, ONE-LOOK AUTHENTICATION ARE YOU READY? Select Authenticate Purchase Nok Nok Labs 21
22 NOK NOK LABS The FIDO Alliance
23 GOAL: SIMPLER STRONGER AUTH INTERNET SERVICES COMPONENT & DEVICE VENDORS SOFTWARE & STACKS
24 FIDO EXPERIENCES ONLINE AUTH REQUEST LOCAL DEVICE AUTH SUCCESS PASSWORDLESS EXPERIENCE (UAF STANDARDS) Transac2on Detail Show a biometric Done SECOND FACTOR EXPERIENCE (U2F STANDARDS) Login & Password Insert Dongle, Press bu=on Done
25 OPTIONS FOR SERVICES Passwordless UX = UAF: Universal Auth Framework User carries client device with UAF stack installed User presents a local biometric or PIN Website can choose whether to retain password Second Factor UX = U2F: Universal Second Factor User carries U2F device with built-in support in web browsers User presents U2F device Website can simplify password (e.g, 4 digit PIN) Simpler Stronger Authentication
26 WHAT'S THE BENEFIT? For Users Easy to use No more worrying about passwords Be safer on the Internet For Internet Services Greatly improved PKI based security Increased user engagement User brings own device Build server once: Leverage any auth method For Vendors Standardization ignites market Move past fragmented custom solutions
27 FIDO TODAY Technical Working Groups active o Public Spec Drafts early 2014 o Pilots in progress o Complement to existing standards & efforts! e.g., Federation, OpenID, SAML etc Actively adding to FIDO membership o Targeting Internet Services, Client Platform Owners, Device & Component Vendors, System Integrators Simpler Stronger Authentication JOIN US!! info@fidoalliance.org rajiv@noknok.com
28 AUTHENTICATION IS THE GATEWAY SERVICES, REVENUE STREAMS, DIFFERENTIATION Mobile Payments M-Commerce Authenticate Movies Stores Books Music Internet of Things Cloud Services 28
29 THE ECOSYSTEM INTERNET SERVICES COMPONENT & DEVICE VENDORS SOFTWARE & STACKS
30 Any Device. Any Application. Any Authenticator.
THE CHANGING FACE OF MOBILE PAYMENTS SECURITY
THE CHANGING FACE OF MOBILE PAYMENTS SECURITY Past and Future of Authentication RAJIV DHOLAKIA NOK NOK LABS rajiv@noknok.com NOK NOK LABS NNL CARTES America APRIL 2013 1 CONSIDER THE HUMBLE IGNITION KEY
More informationScalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
More informationFIDO Modern Authentication Rolf Lindemann, Nok Nok Labs
Rolf Lindemann, Nok Nok Labs cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Authentication in Context Single Sign-On Modern Authentication Federation
More informationUAF Architectural Overview
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 UAF Architectural Overview Specification Set: fido-uaf-v1.0-rd-20140209 REVIEW DRAFT Editors: Rob Philpott, RSA, the Security Division of EMC Sampath
More informationHow Secure is Authentication?
FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site
More informationHow Secure is Authentication?
U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered
More informationTECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION. Any device. Any application. Any authenticator.
TECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION Any device. Any application. Any authenticator. Table of Contents Introduction... 3 The Problem With Authentication Today... 4 New Possibilities...
More informationMobile Connect & FIDO
Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well
More informationSocial Media Single Sign-On: Could You Be Sharing More than Your Password?
Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com
More informationDevice-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
More informationUser Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones ijones@tozny.com http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
More informationCan We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationTIT E IS A. Social Media. Soziale Netze und IT Sicherheit. Herausforderung? Chance? Alfred Bach Solution Strategist ALPS WE CAN IN BO
TIT E Social Media IS A QUES Soziale Netze und IT Sicherheit Herausforderung? Chance? Alfred Bach Solution Strategist ALPS WE CAN ANSW IN BO 1.43B social network users by 2012¹ 305B mobile app downloads
More informationThe Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD ijones@seqrd.com @SyntaxPolice Goals & Talk outline Update the group on authentication
More informationHelping organizations secure and govern application services for SOA, Web and the Cloud
Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA
More informationMOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
More informationEnhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
More informationCase Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationApache Milagro (incubating) An Introduction ApacheCon North America
Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationSecuring WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
More informationTrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationSafewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
More informationTimes they are a-changin
Ethernet Alliance Technology Exploration Forum 2013 Times they are a-changin Tom Burns Vice President, General Manager Dell Networking October 15, 2013 Challenges in Enterprise, Data Center making Networking
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationEnabling SSO for native applications
Enabling SSO for native applications Paul Madsen Ping Identity Session ID: IAM F42B Session Classification: Intermediate Mobile Modes Source - 'How to Connect with Mobile Consumers' Yahoo! Overview Enterprise
More informationFIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationBYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity
BYE BYE PASSWORDS The Future of Online Identity Hans Zandbelt Sr. Technical Architect CTO Office - Ping Identity 2015 Copyright 2014 Ping Identity Corp. All rights reserved. 1 Agenda 1 2 3 Cloud & Mobile:
More informationA Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann
A Movie Streaming Application & ABC4Trust as Services in the Cloud Dr. Anja Lehmann IBM Research Zurich A research project funded by the European Commission s 7th Framework Programme. Lessons learned from
More informationWearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec
Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown
More informationCustomer Identity and Access Management (CIAM) Buyer s Guide
Customer Identity and Access Management (CIAM) Buyer s Guide Shifting Marketplace Over the last five years, there has been a major shift in how enterprises need to look at and secure customer identities
More informationCitrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
More informationMoving Beyond User Names & Passwords Okta Inc. info@okta.com 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Moving Beyond
More informationCLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationHOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
More informationHOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
More informationOpenID & Strong Authentication
OpenID & Strong Authentication CTST 2009: Emerging Technology D14: Smart Cards, Tokens & Digital Identity May 5, 2009 Brian Kelly Vice President TrustBearer Labs Simplify Multi-factor authentication can
More informationEnterprise Mobility Space
MBaaS How MBaaS is Shaping up the Enterprise Mobility Space A RapidValue Solutions Whitepaper Contents Executive Summary... What is Mobile Backend as a Service (MBaaS)?... Primary Building Blocks of MBaaS...
More informationInterconnecting Devices and Applications of all Brands to Invent New Business Opportunities for Network Service Providers
Interconnecting Devices and Applications of all Brands to Invent New Business Opportunities for Network Service Providers SoT : the Services of Things TECHNICOLOR TECHNOLOGY ENTERTAINMENT SERVICES CONNECTED
More informationOpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
More informationStandards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
More informationPRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
More informationOpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T H ow M o b i le Au thentication C a n B o o s t P r o d u c t i vi t y f o r M o b i le Ap p l i c a t i o n s December 2013 Adapted from Worldwide Mobile Enterprise
More informationMONETIZING THE MOBILE APP. A Light Reading Webinar Sponsored by
MONETIZING THE MOBILE APP A Light Reading Webinar Sponsored by TODAY S PRESENTERS ANDY GRAY Moderator Heavy Reading CASSIDY SHIELD Head of Global Marketing Content, Cloud, Communications 2 AGENDA 1. Service
More informationFinal Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management
More informationWHITE PAPER. Active Directory and the Cloud
WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationMOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationMOBILE HELIX LINK SDK OVERVIEW A MOBILE HELIX WHITEPAPER
SECURE ENTERPRISE HTML5 MOBILE HELIX LINK SDK OVERVIEW A MOBILE HELIX WHITEPAPER MOBILE HELIX LINK SDK OVERVIEW Mobile Helix Link Your business is everywhere, your information needs to be. Introduction
More informationExtending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox
Extending APS Packages with Single Sign On Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox Introducing APS 2.0 A Platform for Integration APS Dynamic UI HTML5 Extensibility Certified
More informationState of Hawaii Excellence in Technology Award Nomination. Single Sign On (SSO) for the Hawaii State Department of Education
State of Hawaii Excellence in Technology Award Nomination Single Sign On (SSO) for the Hawaii State Department of Education Cross-Boundary Collaboration and Partnerships Data, Information and Knowledge
More informationThe Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
More informationIdentity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
More informationS E P T E M B E R 2 0 1 4
S E P T E M B E R 2 0 1 4 IRIS-ENABLED SMARTWATCH AND ITS APPLICATIONS INTRODUCTION Iris Recognition Enabled Smartwatch Convergence of wearables and biometrics Will bring the widespread use of iris recognition
More informationMid-Project Report August 14 th, 2012. Nils Dussart 0961540
Mid-Project Report August 14 th, 2012 Nils Dussart 0961540 CONTENTS Project Proposal... 3 Project title... 3 Faculty Advisor... 3 Project Scope and Individual Student Learning Goals... 3 Proposed Product
More informationBlue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
More informationPrivacy and Security Advantages of Social Login. White Paper
Privacy and Security Advantages of Social Login White Paper User Management Platform for the Social Web white paper Privacy and Security Advantages of Third-Party Authentication The practice of implementing
More informationGlinda Cummings World Wide Tivoli Security Product Manager
Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!
More informationCost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
More informationMy Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationIs Consumer-Oriented Strong Authentication Finally Here to Stay? Arshad Noor, CTO, StrongAuth, Inc. Professional Strategies S22
Is Consumer-Oriented Strong Authentication Finally Here to Stay? Arshad Noor, CTO, StrongAuth, Inc. Professional Strategies S22 Historical Perspective Password-based authentication invented at least 4-5
More informationCloudessa AAA and Captive Portal Cloud Service
Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi
More informationEntrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
More informationPRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things
PRODUCT BRIEF OpenAM Delivering secure access for customers, applications, devices and things Introduction Identity and access management is going through a new golden age. CEOs are pushing growth as their
More informationWHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
More informationFIDO: Fast Identity Online Alliance Privacy Principles Whitepaper vfeb2014
FIDO: Fast Identity Online Alliance Privacy Principles Whitepaper vfeb2014 The FIDO Alliance: Privacy Principles Whitepaper Page 1 of 7 FIDO Privacy Principles Introduction The FIDO Alliance is a non-profit
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More informationMoving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871
More informationMore Expenses. Only this time the Telegraph will have to pay them after their recent data breech
More Expenses Only this time the Telegraph will have to pay them after their recent data breech What is an Identity? Wiki Definition Digital identity refers to the aspect of digital technology that is
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationHow to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
More informationCLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT
TITLE CLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT Q2 2015 Published Q3 2015 Cloud Adoption & Risk in Financial Services Report - Q2 2015 00 TABLE OF CONTENTS 01 02 04 05 07 10 INTRODUCTION OVERVIEW
More informationInteroperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
More informationMIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
More informationThe PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationA Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
More informationSUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity
BUYER CASE STUDY SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity Sally Hudson IDC OPINION Global Headquarters:
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationBrian Spector CEO, CertiVox. CloudAuthZ
Brian Spector CEO, CertiVox CloudAuthZ Removes username and password databases Two-Factor Authentication No single point of failure Simplified and improved UX Pricing that scales for the cloud What is
More informationActive Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper
Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationSecurity Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
More informationAddressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More information2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
More informationTaking the cloud to your datacenter
Taking the cloud to your datacenter Microsoft Azure Stack Version 1.0 1/29/2016 CONTENTS Cloud is a paradigm, not a place... 2 Cloud computing on your terms... 3 Microsoft Azure Stack vision... 4 Reinventing
More information