DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.



Similar documents
DigitalPersona Pro Enterprise

SCB Access Single Sign-On PC Secure Logon

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Identity Access Management: Beyond Convenience

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

etoken Single Sign-On 3.0

Strong Authentication. Securing Identities and Enabling Business

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century

Multi-Factor Authentication

2003, Rainbow Technologies, Inc.

Self-Service, Anywhere

A Guide to Managing Microsoft BitLocker in the Enterprise

VPN Solutions FAQ North America International Germany Benelux France Spain Israel Asia Pacific Japan

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Strong Authentication for Secure VPN Access

Authentication: Password Madness

An Oracle White Paper December Implementing Enterprise Single Sign-On in an Identity Management System

Remote Access Securing Your Employees Out of the Office

The Ultimate Authentication Technology

WHITEPAPER. Identity Access Management: Beyond Convenience

Enterprise Data Protection

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

RSA SecurID Two-factor Authentication

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

IT Agility that Drives Business Forward

Guide to Evaluating Multi-Factor Authentication Solutions

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

IT Compliance Volume II

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

The Essential Security Checklist. for Enterprise Endpoint Backup

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Introducing etoken. What is etoken?

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Choosing an SSO Solution Ten Smart Questions

Research Information Security Guideline

Simplifying Security with Datakey Axis Single Sign-On. White Paper

CRYPTOCard. Strong Two Factor Authentication

Firmware security features in HP Compaq business notebooks

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Access Your Cisco Smart Storage Remotely Via WebDAV

Privacy and Encryption in egovernment. Dewey Landrum Technical Architect CSO SLED West Sector CISSP August 11, 2008

The Convergence of IT Security and Physical Access Control

Accessing the Media General SSL VPN

ADVANCE AUTHENTICATION TECHNIQUES

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

Digital War in e-business

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Copyright Giritech A/S. Secure Mobile Access

How Speech Recognition will Disrupt Enterprise BYOD Plans. Presented at Mobile Voice Conference 2014

WHITE PAPER Identity Management in a Virtual World INTRODUCTION. Sponsored by: Aladdin Knowledge Systems. Charles J.

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

solutions Biometrics integration

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

What do passwords cost your business?

White Paper: Managing Security on Mobile Phones

Convenience and security

The Role of Password Management in Achieving Compliance

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

REGULATIONS AND COMPLIANCE FOR ENTERPRISE MOBILE HEALTH APPLICATIONS

BlackBerry Enterprise Solution and RSA SecurID

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Two Factor Authentication for VPN Access

The Convergence of IT Security and Physical Access Control

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

CHIS, Inc. Privacy General Guidelines

Securely Delivering Applications Over the Internet. White Paper

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

e-governance Password Management Guidelines Draft 0.1

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Secure Authentication Managed Service Portfolio

A Feasible and Cost Effective Two-Factor Authentication for Online Transactions

2 factor + 2. Authentication. way

Two-Factor Authentication Making Sense of all the Options

Xerox DocuShare Security Features. Security White Paper

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

plantemoran.com What School Personnel Administrators Need to know

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

IT Audit- Hospital Risks, Controls and Audit. AHIA Conference. Grant Thornton LLP. All rights reserved.

Encryption as a Cloud Service provides the lowest TCO

Passlogix Sign-On Platform

Internet threats: steps to security for your small business

ScoMIS Encryption Service

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

How Secure is your Authentication Technology?

Virtual Desktops made Easy Jeff Clark, IBM Matt Fordham, Avnet

DATA SECURITY: EVERYTHING YOU NEED TO KNOW

Solving the Weakest Link in Network Security: Passwords

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

How To Choose An Authentication Solution From The Rsa Decision Tree

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

SSL VPN: Improving the ROI of Remote Access Secure Authentication and Access to your Critical Resources

Application of Biometric Technology Solutions to Enhance Security

Transcription:

DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.

Rising Security Needs Secure Access Control is Critical Users Access Security Information Engineering, Intellectual Property Employee Records, Health Plans Accounting, Payroll Email Accounts, Contracts, Customer Lists

Rising Security Needs Secure Access Control is Critical Users Password: Login: JimA Jim Access Security Information Engineering, Intellectual Property Employee Records, Health Plans Accounting, Payroll Email Accounts, Contracts, Customer Lists

User Authentication The Achilles Heel of Corporate Security What s the weakest link in the security chain? Network Security Firewalls, DES, SSL encryption People! Server Security Intrusion Detection Strict Access Controls Digital Certificates PC Security Secure OS s TCPA User Authentication Passwords

Password Security? Lack of Control Severely Limits Security Low security PASSWORD1 PASSWORD2 71% unauthorized break-ins by corporate insiders! 2000 CSI/FBI Computer Crime Survey 84% of bank fraud is committed by in-house staff. Bank Technology News- Survey 2000, Cap Gemini Ernst & Young high frustration 40% of all help desk calls are for forgotten passwords. and costly. Each year companies spend up to $200-$300 per user trying to maintain secure passwords. Gartner Group, Forrester Research Gartner Group

New Credential Technology Today s credential options for user authentication: PASSWORD1 PASSWORD2 WHAT YOU KNOW Passwords Advanced Technology User Specific Not User Dependant WHAT YOU HAVE Smart Cards, Tokens WHO YOU ARE Biometrics

Biometrics Security & Convenience Never forget it Can t lose it Unique to individual Can t be stolen Can t be guessed Can t be shared

Biometrics Market Rapidly Securing IT Environments $6,000 ( 94) $600M/yr ( 03) PRICE MARKET $99-$149 (today) $12M / yr ( 98) 1994 1996 1998 2000 2002 2004 Market Forecast Source: International Biometric Group

IT Authentication Market Forecasts Frost & Sullivan, $2.6B, ( 06) International Data Corporation, $1.8B ( 04) Salomon Smith Barney, $1B ( 04) International Biometric Group, $600M ( 03) Lehman Brothers, $400M ( 04) MARKET 1994 1996 1998 2000 2002 2004 International Biometrics Group: 1999 Biometric Systems Revenue $58.4M

DigitalPersona Industry Leadership U.are.U $6,000 Breakthrough Breakthrough 3rd-Generation 3rd-Generation Fingerprint Fingerprint Algorithm- Algorithm- Faster, Faster, More More Accurate Accurate First First USB, USB, Plug-and-Play Plug-and-Play Sensor- Sensor- Better Better Performance, Performance, Higher Higher Security Security First First PC PC Solution Solution for for Less Less Than Than $100 $100 First First Secure Secure Network Network Solution- Solution- Designed Designed with with IBM IBM for for Corporations Corporations $99-$149 First First Biometric Biometric Authentication Authentication Service Service for for the the Internet Internet 1996 1997 1998 1999 2000 2001

U.are.U Pro Biometric Authentication System Users Information Access JimA Security Jim Engineering, Intellectual Property Employee Records, Health Plans Accounting, Payroll Email Accounts, Contracts, Customer Lists

U.are.U Pro Biometric Authentication System Users Information Access Security Engineering, Intellectual Property Employee Records, Health Plans Accounting, Payroll Email Accounts, Contracts, Customer Lists

U.are.U Pro Enterprise Ready- Secures all Applications Users User Authentication U.are.U Pro Applications Comprehensive Enterprise Support PC & Network Logon Windows 98 Windows NT Windows 2K Application Servers Win NT/2K Unix App s Linux App s Mainframe Web-Based Applications Intranet Extranet CRM, ERP Other Security Technologies VPN Digital Certificates PIN codes Smart Cards

U.are.U Pro Biometric Authentication System U.are.U Pro Workstation U.are.U Pro Workstation Software One Touch Application Suite Administration Software Windows 95/98/NT/2000/Me U.are.U Fingerprint Sensor USB plug-and-play Secure Design (local encryption and challengeresponse link) U.are.U Pro Server U.are.U Pro Server Software Windows NT and 2000 Network Servers Back-up Controller Support Administration Tools

U.are.U Pro PC & Network Ready- Supports Critical Environments Standalone PC s Protect telecommuter PC s at home Strong logon policy support Secure encrypted disk space Corporate Networks Protect against unauthorized attacks Scales to 1000 s of users Strong network logon policy support Secure central storage of user records Central system administration tools Back-up server and database support Mobile Users Protect lost or stolen laptops Strong logon policy support Secure encrypted disk space Supports docked network connection

U.are.U Authentication Password Elimination Provides Quick ROI Cost of Password Administration vs. U.are.U Pro $1,000 $800 $600 Yrly Password Costs: $200 -- $300 per user!!!! $400 $200 $0 1st Year 2nd Year 3rd Year 4th Year Passwords U.are.U

Target Market Segments Corporations 71% of security breaches are internal 40% of all help desk calls are password related Increasingly distributed network configurations and internet use demand higher security. Health Care Health Insurance Portability & Accountability Act (HIPAA) requires the protection of patient information Scope of HIPAA extends beyond health care providers Finance Gramm-Leach-Bliley Act (GBLA) requires protection of customer information and records Security conscious community with strong security awareness Government High profile security breach created focus on IT security 50% of the 54 federal agencies failed to meet basic security standards, General Accounting Office 2000 Mobile and Remote Access more than 300,000 laptops are stolen a year mobile users tend to carry valuable unprotected data on laptops remote access is points are often primary target for network intrusitons

Comparison Password Systems ADMINISTRATION Inconsistent tools for each system Limited or no security policy tools SECURITY Low-security credential (password) Single credential only (password) Easily shared, lost, stolen, forgotten, hacked USERS Hard to use Multiple passwords to remember U.are.U Pro ADMINISTRATION Comprehensive authentication management for all systems Advanced security policy tools SECURITY High-security credential (fingerprint) Can t be shared, lost, stolen, forgotten Multiple credential support (fingerprints and passwords) Layered credential support USERS Easy to use (One Touch TM Logon) No passwords to remember

SUMMARY Corporate security needs are real Passwords present tremendous security risks Biometric user authentication is the answer Enforced security provides control More convenient for users and administrators Less than 1-year ROI The Time is NOW Industry leaders have endorsed technology Price-performance breakthroughs are fueling rapid deployment Already installed on 100 s of thousands of PC s Supports all applications Eliminates unnecessary corporate security risk

DigitalPersona U.are.U Industry Leadership- Awards The Most Awarded Biometric Solution Provider WinList, Winmag.com Best Buy, SC Magazine Editors' Choice, PC Magazine Best of Comdex, PC Week Editor's Choice, Network Computing Top Ten Office Products of 2000, Washington Post Finalist Award for Technical Excellence, PC Magazine Finalist, Well Connected Award, Network Computing Best New Products Award Finalist, Government Computer News Best Biometric Security Device, Searcher: The Magazine for Database Professionals

DigitalPersona U.are.U Industry Leadership- Partners The Worlds Largest Partners 9/19/00 DigitalPersona s U.are.U FINGERPRINT AUTHENTICATION TECHNOLOGY WILL BE FEATURED AS PART OF WORLD SECURITY SOLUTIONS TOUR WITH IBM --U.are.U Fingerprint Recognition System Showcased as Leading Biometric Component of Next-Generation Computer Security Programs-- 9/15/00 DigitalPersona LEADS CHARGE IN BRINGING BIOMETRICS TO MAINSTREAM COMPUTING --World s Largest Keyboard Manufacturer to Integrate U.are.U Fingerprint Recognition System-- 9/14/99 DigitalPersona ANNOUNCES IBM PARTNER RELATIONSHIP --DigitalPersona Provides U.are.U Pro Fingerprint Technology for IBM Secure Commercial Desktop PCs with Embedded Security Chip--

DigitalPersona U.are.U Industry Leadership- Customers In Evaluation at ~ 20% of the Fortune 1000 1/4/01 CITY OF GLENDALE INTRODUCES DigitalPersona s U.are.U Pro FINGERPRINT RECOGNITION SYSTEM TO CITY EMPLOYEES --Biometrics-Based Solution Will Heighten Computer Security And Save Taxpayers $50,000 Per Year-- 1/8/01 CALIFORNIA COMMERCE BANK UTILIZES BIOMETRICS TO ENHANCE PRODUCTIVITY, PROFITABILITY, SECURITY --U.are.U Pro Fingerprint Recognition System Installed Last Year Meets Mandates of Financial Services Modernization Act of 1999 -- 9/7/00 LEADING MEDICAL INFORMATION PROVIDER COMVIEW IMPLEMENTS DigitalPersona FINGERPRINT SECURITY SYSTEMS -- Cardiac Image Provider Anticipates Need for Compliance with New Medical Industry Standards --

No Risk Security Plan 1. Preliminary Quote Installation Pro Workstation Pro Server Service and Support 2. Pilot Program 3. Full Deployment

Back-up Slides

Digital Certificates Require Secure User Authentication Digital Certificates are electronic tokens / keys used in many high security environments. They can be stored on a PC, a smart card, or a server. Use of the key requires secure user authentication! USER AUTHENTICATION Digital Certificate 010111011000101

Biometrics Security & Convenience Biometric technology options: Non-intrusive Accurate Affordable Fingerprint Yes Yes Yes Iris No Yes No Face No No Yes Voice Yes No Yes