Intel Open Day. VASCO and Intel Identity Protection Technology. Richard Zoni Sales Manager Italy. 2011 - VASCO Data Security



Similar documents
Gründe für Starke Authentifizierung

Strong Authentication in details

IDENTIKEY FEDERATION SERVICES

DIGIPASS as a Service. Google Apps Integration

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

DIGIPASS Authentication for Check Point Connectra

MIGRATION GUIDE. Authentication Server

Intel Identity Protection Technology (IPT)

DIGIPASS Authentication for Cisco ASA 5500 Series

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

VASCO Data Security. The Authentication Company. Richard Zoni Channel Manager Italy

VASCO Consulting Services

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Identikey Server Getting Started Guide 3.1

DIGIPASS Authentication for GajShield GS Series

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

DIGIPASS Authentication for Check Point Security Gateways

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

DIGIPASS Authentication for Windows Logon Product Guide 1.1

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Entrust IdentityGuard

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

IDENTIKEY Appliance Administrator Guide

BlackShield ID Agent for Remote Web Workplace

Symantec VIP and Intel IPT Tecnologia e sicurezza on the cloud

Identikey Server Windows Installation Guide 3.1

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

IDENTIKEY Server Product Guide

Make it Mobile. How to successfully implement a secure mobile strategy.

Active Directory Reporter Quick start Guide

French Justice Portal. Authentication methods and technologies. Page n 1

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Dell One Identity Cloud Access Manager How to Configure for High Availability

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Choosing a Replacement for Incumbent One-Time Password Tokens

Copyright 2013, 3CX Ltd.

IDENTIKEY Server Windows Installation Guide 3.1

OVERVIEW. DIGIPASS Authentication for Office 365

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. General Radius Config

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Business Internet Banking

Understanding Enterprise Cloud Governance

Simplify and Secure Cloud Access to Critical Business Data

Two-Factor Authentication

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

Strong Authentication for Microsoft TS Web / RD Web

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Agent Configuration Guide

Identikey Server Product Guide

Check Point FDE integration with Digipass Key devices

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Improving Online Security with Strong, Personalized User Authentication

BlackShield Authentication Service

About Contract Management

Everything you always wanted to know about MAP but were afraid to ask

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

IDENTIKEY Server Administrator Reference 3.1

Identikey Server Performance and Deployment Guide 3.1

IDENTIKEY Server Windows Installation Guide 3.2

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner Pipelinersales Inc.

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Two Factor Authentication for VPN Access

Identikey Server Administrator Reference 3.1

Oracle Enterprise Manager

Defender Token Deployment System Quick Start Guide

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

The Key to Secure Online Financial Transactions

Mobile Device Management Version 8. Last updated:


Remote Access Securing Your Employees Out of the Office

Overview of Microsoft Office 365 Development

CLOUD SECURITY: Secure Your Infrastructure

Strong Authentication for Microsoft SharePoint

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

Security Analytics Engine 1.0. Help Desk User Guide

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Dell One Identity Cloud Access Manager SonicWALL Integration Overview

Strong Authentication for Juniper Networks

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Transcription:

Intel Open Day ASCO and Intel Identity Protection Technology 2011 - ASCO Data Security Richard Zoni Sales Manager Italy

Agenda 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 2

Please log in to get started JohnDoe ******** x8 per day 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 3

Accessible from any Device x4 devices 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 4

Connecting to multiple web applications 25 accounts 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 5

How many passwords do you have? PASSWORD 2% 26% 6 passwords 23% 18% 15% 16% 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 6

Which password for which site? PASSWORD 2% 26% 23% 18% 15% 16% 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 7

2012 - ASCO Data Security Lunch&Learn with ASCO and Intel Convenient but not Secure 1 Password 8

Your concern? $ 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 9

Fraud $ Phising, Pharming, Trojan Horses Post-its, stolen PC, 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 10

Inconvenient 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 11

Total Cost of Ownership 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 12

Bill Gates People use the same password on different systems, they write them down and they just don t meet the challenge for anything you really want to secure 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

What are ASCO s Core Activities? 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 15

References in Financial Institutions 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 16

References in Enterprise Market 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 17

Profilo Aziendale ASCO è un azienda globale con HQ in Svizzera e USA 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 18

Nominated TOP 5 in System Software Industry Highest Sales Growth in the Systems Software Industry SmarTrend(R) News Watch via COMTEX. As of Jan 10, 2012 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 19

In TOP 5 again Highest Revenue Per Employee in the Systems Software Industry 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 20

Sold & Deployed world wide GO 3 GO 6 CertiID Key 101 250-251 260-261 270 270 XPress 275 GO 7 GO 100 Key 200 Key 860 301 C 550 560 736 irtual Nano for Mobile 805 800 810 815 820 830 831 835A for Windows for Web 836 837 840A 840 C 855 865 905 920 2012 - ASCO Data Security Lunch&Learn with MY.COM ASCO and Intel 21

Ability to execute Magic Quadrant for User Authentication Challengers Leaders Niche players isionaries Completeness of ision 2012 - Gartner, Inc. and/or its affiliates. As of January 2012 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 22

ASCO customers 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 23

BNL 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

INTESA SANPAOLO 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

DEUTSCHE BANK 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

CitiBANK 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

PayPal 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

Senato della Repubblica 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

INPS 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

OLO 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

SEA Aeroporti Milano OTP PIN 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

Zurich Italia 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

AXA Italia 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

HARIBO 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel

Gaming Industry 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 36

The times they are a changin New Markets/Structure Commoditization Competition Mobile Cloud Computing Fraud Regulation SMS PKI OpenID, Rest, Soap, OaAUTH, Oath, etc. 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

Top 5 Requirements PASSWORD 2% 26% Your Web Application 23% 18% 15% 16% 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 38

Omnipresent dp+ IPT DESS DESS 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 39

Easy to Integrate Your Web Application 2012 - ASCO Data Security Lunch&Learn with MY.COM ASCO and Intel 40

Convenient SMS Your Web Application 2012 - ASCO Data Security Lunch&Learn with MY.COM ASCO and Intel 41

Proven Security SMS Your Web Application 2012 - ASCO Data Security Lunch&Learn with MY.COM ASCO and Intel 42

One Login for all Applications & Services 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 43

Digital Identity s Balancing Act Threats Usability 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

Intel IPT Ultrabook Adoption of Intel Identity Protection Technology Introduction of True Cove (esig) iew seen by malware 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

DPWEB IPT End User End user receives indication on how to register Once registered, if the PC is IPT compliant, he uses DPWEB in conjunction with hardware Secure Element All hardware related registration is provisioned by asco. User s OTP alidation can be done by DPS or using any asco Authentication Backend 2011 - ASCO Data Security Define Lunch&Learn Title in Insert with Header/Footer ASCO and Slide Intel 52

DPWIN IPT End User User Downloads DPWIN IPT or Admin installs it remotely. Activation Form starts when first launching the DPWIN. Once Activated, ready to be used. 2011 - ASCO Data Security Define Lunch&Learn Title in Insert with Header/Footer ASCO and Slide Intel 53

ASCO Simplicity ASCO per la Strong User Authentication Certezza identità Riduzione costi helpdesk Aumento dell utilizzo 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel 54

Simplicity To adopt a simple product effectively, an organization must understand the complexity of the problem that it solves. 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

Thank you 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

Thank you. Richard Zoni Sales Manager Italy richard.zoni@vasco.com 2011 - ASCO Data Security Lunch&Learn with ASCO and Intel

Copyright & Trademarks Copyright 2011 ASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of ASCO Data Security. Trademarks ASCO, ACMAN, IDENTIKEY, axsguard, and the logo are registered or unregistered trademarks of ASCO Data Security, Inc. and/or ASCO Data Security International GmbH in the U.S. and other countries Disclaimer of Warranties and Limitations of Liabilities This Report is provided on an 'as is' basis, without any other warranties, or conditions. 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 58