Secure User Authentication



Similar documents
The Cloud, Mobile and BYOD Security Opportunity with SurePassID

A brief on Two-Factor Authentication

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

ADDING STRONGER AUTHENTICATION for VPN Access Control

STRONGER AUTHENTICATION for CA SiteMinder

Strong Authentication in details

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Hard vs. Soft Tokens Making the Right Choice for Security

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Secure Web Access Solution

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Jrsys International Corp.

A new Secure Remote Access Platform from Giritech. Page 1

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets

Remote Access Securing Your Employees Out of the Office

2 factor + 2. Authentication. way

Hosted Desktop for Business

BlackShield ID Best Practice

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Whitepaper. Vertex VDI. Tangent, Inc.

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

DIGIPASS Authentication for Cisco ASA 5500 Series

MIGRATION GUIDE. Authentication Server

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

RSA SecurID Two-factor Authentication

ProtectID. for Financial Services

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

ACCESS MANAGEMENT UTILITY SERVICE via SECOND FACTOR AUTHENTICATION (2FA)

Ultra-strong authentication to protect network access and assets

Secure remote access to your applications and data. Secure Application Access

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

HOTPin Integration Guide: DirectAccess

Research Information Security Guideline

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Facebook s Security Philosophy, and how Duo helps.

VMware Virtual Desktop Manager User Authentication Guide

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

FortiAuthenticator. User Authentication and Identity Management. Last Updated: 17 th April Copyright Fortinet Inc. All rights reserved.

Entrust IdentityGuard

Proven. Trusted.

Multi-Factor Authentication FAQs

API-Security Gateway Dirk Krafzig

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Intel Identity Protection Technology (IPT)

Two-Factor Solutions Choosing the Right One"

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

CRYPTOCard. Strong Two Factor Authentication

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Executive Summary P 1. ActivIdentity

Interact Intranet Version 7. Technical Requirements. August Interact

Guide to Evaluating Multi-Factor Authentication Solutions

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

DIGIPASS Authentication for GajShield GS Series

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

NetIQ Advanced Authentication Framework

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Strong Authentication for Secure VPN Access

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Improving Online Security with Strong, Personalized User Authentication

Adding Stronger Authentication to your Portal and Cloud Apps

WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION

DigitalPersona Pro Enterprise

EndUser Protection. Peter Skondro. Sophos

Securing Virtual Desktop Infrastructures with Strong Authentication

ADAPTIVE USER AUTHENTICATION

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

The Convergence of IT Security and Physical Access Control

epass OTP Authentication System White Paper

RSA Authentication Manager 7.1 Basic Exercises

User Guide. Version R91. English

Multi-Factor Authentication for first time users

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Setting Up and Accessing VPN

Systems Manager Cloud Based Mobile Device Management

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Mobile Access Software Blade

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Transcription:

Secure User Authentication BYOD (Bring Your Own Device) Strong 2-factor Authentication with password and OTP, keep your users identity safe. Mobile One Time Password Unpredictable Unrepeatable Only valid for once. OTP is known as "one-time password" or "dynamic password"; features a robust protection lock ensures account access safety and protection against important data theft by hackers or others, rapidly enhances the application system safety. CHANGING MOTP helps you meet Personal Data Protection Act, PCI-DSS, HIPAA requirements, etc, by providing OATH certified 2FA access control and auditing log. www.changingtec.com

Strong Two-Factor Authentication Over the last few years, Mobile internet Device (MID) and e-commerce is threatened by more security challenges than ever. It happens always like hacking account and online game because of traditional login which fixed user name and password is easily hacked by Trojan, keylogger, or back door. No more secure. One-Time Password (OTP) is a strong lock to protect account access safe. It avoids losing important information from password peep and hackers, dramatically increases system security, and simplifies access steps for users (both employee and external ones). OTP ID PW OTP USERNAME ****** 315407 Login Login Success Website Homepage protection Governmental agency Remote login Enterprise application Finance Negotiable securities Game industry Online Shop Certified by OATH International Standard The MOTP system offers the most convenient two-factor authentication solution. Users can use the MOTP token to access application systems such as VPN, firewalls, remote connections, webpage servers, web applications, operating systems and more. MOTP Solutions It has 3 parts including token, agent and server. MOTP Token A variety of authentication tokens are supported including both "software" and "hardware" tokens. These are very easy to use and suitable for all types of users. MOTP Agent (Applications) RADIUS / LDAP authentication (support VPN, firewalls, UTMs, VMware VDI and Citrix) Web server authentication (IIS/JAVA Web Filter) Customized ID/Password web page (.NET, ASP, JSP, PHP) Linux, Windows login OWA (Outlook Web Access) Mail Active Sync Management on Mobile Device (ios&android) MOTP Authentication Server The server takes the managing and authentication part of the solution. It validates the dual factor password, and manages authentication policy. It is available as "standard rack mount server" and "virtual machine (VM)". Standard hardware server : It simplifies installation, enhances system security, lowers setup costs and shortens setup time. > Specification: 19-inch rack, 1U, 80GB for authentication logging. > Support HA (fail-over) mechanism. Virtual machine : The server can be delivered as a VM image to meet the special environment on the client side.

Provide Complete OTP Authentication Server Functionality Web based management interface Support batch import and activation Stores OTP key in DB after encryption Provide auditing log Online activation mechanism Anti hostile attack prevention mechanism Provide temporary block/unblock and temporary OTP mechanism HA structure Event, time based, OCRA, Push APP and On-demand OTP verification support. *OCRA : OATH Challenge-Response Algorithm Token Agent Server SMS Push APP Smart Phone PAD Intel IPT VPN Firewall RADIUS / LDAP E-Mail Login 請 使 用 密 碼 或 PassCode 進 行 登 入 帳 號 : 密 碼 : Passcode: 登 入 API 563 068 Token Internet Web AP MOTP Server Display Card System Config Flash Drive Windows AD, IIS, OWA Active Sync OK C OCRA

Full series of OTP Tokens Software Tokens Support Platforms ios, Android, J2ME, Windows PC / Phone... E-mail (On-Demand token) Using e-mail as an OTP carrier. An e-mail contains an OTP will be send if a service is requesting MOTP server. No need for additional hardware. Easy to deploy. Low cost. SMS (On-Demand token) Distribute OTP through the SMS server. The service requests MOTP server to send an OTP SMS on user login. The user receives the OTP by SMS. No need to distribute hardware. Works on all phones with SMS feature. High immediateness. Software Token The software is able to be installed on PC and mobile devices, like smart phone or tablet. Support Android, ios, Windows Phone, etc. Generates OTP anytime, anywhere. Easy to use on mobile devices. Daily carry, hard to forget. No attrition issue while redistribute to others. Perpetual license, no time limit. Support Offline mode and Mobile App Push mode (OTP Push and Mobile online confirmation mode). Support NFC unlock (Android) and Fingerprint Touch ID unlock (ios).

Hardware Tokens Intel IPT Intel Identity Protection Technology ( Intel IPT ) can be found on Intel CPU, including PC, laptop, tablet, and smart phone ( Windows 8 and Android ). Intel Identity Protection Technology is as convenient as s / w token, and as secure as h / w token. Button Type T210 Time-based algorithm. Generates OTP by pressing button. Large-size LCD display. OTP valid 60 seconds. Button can withstand more than 14,000 times. Low battery consumption. Battery life 5 years. Anti-tampering. Compatible with IP68. Large-size LCD comforts eyes. USB Type Y100 Enter OTP by simply plug in to USB port and then press the metal button. No need to read and type OTP. Solid and durable, easy to carry. OK C OCRA Type T300 Challenge-Response Type:The token generates OTP by enter a challenge code which is sent by the server. Signature Type:The token generates OTP by enter specific information, like account and amount, for ensuring the correctness and integrity to avoid MIM (Man in the middle attack). Enhances the security by adding more parameters to 2FA to lower the risk of embezzled token. Display Card Type C221 Seires Time-based algorithm. Generates OTP by pressing button. Displayed on e-paper. OTP valid 60 seconds. Button can withstand more than 14,000 times. Battery life 3 years. Thin and light, size like a credit card. Easy to carry. Support Mifare Entry Access Control System. FISC II Smart Card Generates OTP in the embedded OTP algorithm of the smart card, which counts the number of usage, by component or 2nd Generation reader. Generates OTP with existing bank card.

Applications & Benefits Applications and Case Studies [ Chain Store ] A chain convenient store which has more than 3,000 branches in Taiwan has introduced CHANGING MOTP Mobile One Time Password with hundreds of tokens which allows its employees of HQ and managers of each city from access control. It also applies MOTP system to its supply chain to track login detail information. In the past, store managers access their intranet via VPN which relies on smart card readers to engage PKI. This hardware has poor mobility and flexibility. After adopting MOTP, it eased employees by simplifies login procedures and incredible high secure level. [ Aviation ] A global leading aviation company migrate its access control system to highly secure protection technology, CHANGING MOTP. Before that, they had deployed other OTP system by other supplier which is not able to satisfy their maintain requirements. It suffered MIS from controlling, managing and auditing. It adopts MOTP system using RADIUS to migrate from deployed system after deliberative evaluation and consideration User A on MOTP architecture. It was a pain-free migration, and goes on-line successfully with one-time configuration. MOTP is Citrix ready and experienced numerous success adoptions. We provide local services and professional trainings to your system managing team. Success Stories User A User A 563 068 Token VPN 515 769 Second-Factor Authentication SSO Intranet MOTP Server App 1 App 2 App3 Desktop 1 Desktop 2 Desktop 3 Enterprise Financial Government Education Medical Realtek, acer, UMC, ADATA, Panasonic, initio, tsmc, FUJITSU, YTEC, Farglory Group, Mitsubishi, Shin Etsu,Chunghwa Telecom, Taiwan Mobile, HiNet, 104jobbank, Pan Asia, Formosa Laboratories, Inc., books.com.tw, United Daily News, EVA Air, FamilyMart, Yuen Foong Yu, Coca-Cola, Aop, KUO CHING, Precision Intemational Corp, PICHTEK, MPI, ASUS Cloud, OMG, Soft-World International Corporation, Cyber Power, SUMIKA, Happy Go, Global Unichip Corp,Garena Taichung Bank, E.SUN Bank, Bank of Taipei, Industrial Bank of Taiwan, Taiwan Cooperative Bank, COTA Bank, Bank of Kaohsiung, KGI Bank, Hua Nan Bank, Chang Hwa Bank, Capital Investment Trust Corporation, Franklin Templeton Investments, Chung Kuo Insurance, Taishin Securities Industrial Development Bureau, Ministry of Economic Affairs, Export Processing Zone Administration, Taipei Metro, NAR Labs, Ministry of Health and Welfare, Centers for Disease Control, Taipei City Revenue Service, Ministry of Culture, National Treasury Administration, Food and Drug Administration, Financial Supervisory Commission Jinan University, Chien Hsin University, National Kaohsiung University, National Chung Hsing Univer Pok Oi Hospital, En Chu Kong Hospital, Mennonite Christian Hospital Authorized Reseller Changing Information Technology Inc. 2F, 48 Park Ave.2, Hsinchu Science Park,Hsinchu 30075,Taiwan TEL : +886-3-5630688 FAX : +886-3-5630618