52.000 Gründe für Starke Authentifizierung

Similar documents
Intel Open Day. VASCO and Intel Identity Protection Technology. Richard Zoni Sales Manager Italy VASCO Data Security

IDENTIKEY FEDERATION SERVICES

DIGIPASS as a Service. Google Apps Integration

Grow revenues and profits while securing online subscription accounts

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Strong Authentication in details

DIGIPASS Authentication for Cisco ASA 5500 Series

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

DIGIPASS Authentication for Check Point Connectra

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

MIGRATION GUIDE. Authentication Server

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Identikey Server Getting Started Guide 3.1

Check Point FDE integration with Digipass Key devices

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

DIGIPASS CertiID. Getting Started 3.1.0

OVERVIEW. DIGIPASS Authentication for Office 365

Hyper-V Installation Guide. Version 8.0.0

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

DIGIPASS Authentication for Windows Logon Product Guide 1.1

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

ACER ProShield. Table of Contents

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

Centrify Mobile Authentication Services for Samsung KNOX

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

axsguard Gatekeeper Internet Redundancy How To v1.2

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Intel Identity Protection Technology (IPT)

Configuring IBM Cognos Controller 8 to use Single Sign- On

IDENTIKEY Appliance Administrator Guide

IP Tunnels September 2014

Identikey Server Windows Installation Guide 3.1

The 4 forces that generate authentication revenue for the channel

DIGIPASS Authentication for Check Point Security Gateways

HotSpot Enterprise Mobile Printing Solution. Security Whitepaper

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Centrify Mobile Authentication Services

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner Pipelinersales Inc.

Identikey Server Performance and Deployment Guide 3.1

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

Overview of Microsoft Office 365 Development

Secure Your Mobile Workplace

Secure Mobile Content Management for the Enterprise

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS

Vyom SSO-Edge: Single Sign-On for BMC Remedy

PrinterOn Print Management Overview

LogMeIn Backup. Getting Started Guide

Virtual Contact Center

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

IDENTIKEY Server Windows Installation Guide 3.2

Active Directory Reporter Quick start Guide

Everything you always wanted to know about MAP but were afraid to ask

axsguard Gatekeeper Open VPN How To v1.4

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Venali Internet Fax Services for Microsoft Office 2003

Sophos Mobile Control User guide for Apple ios. Product version: 4

PingFederate. Identity Menu Builder. User Guide. Version 1.0

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

User Self-Service Configuration Overview

ProtectDrive. User Manual Revision: B00

Sophos Mobile Control User guide for Android

IDENTIKEY Server Product Guide

HIPAA/HITECH Compliance Using VMware vcloud Air

Dell One Identity Cloud Access Manager SonicWALL Integration Overview

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

AccelPro SSL VPN v3.1.9 AccelPro SSL VPN. End User Installation Guide for Director General Of Hydro Carbon Users

axsguard Gatekeeper IPsec XAUTH How To v1.6

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0

Securing Enterprise Mobility for Greater Competitive Advantage

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

How to Print Using the PrinterOn Hosted Service & FAQs

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

EXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August by Alexei Balaganski

Windows Hard Disk Encryption

Creating IBM Cognos Controller Databases using Microsoft SQL Server

INTEGRATION GUIDE. General Radius Config

DIGIPASS as a Service. Product Guide

An Oracle White Paper June Security and the Oracle Database Cloud Service

Connectivity to Polycom RealPresence Platform Source Data

Mobile App Quick Start

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

VASCO Consulting Services

Dell ControlPoint Security Manager

Virtual Contact Center

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Administration Quick Start

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Transcription:

52.000 Gründe für Starke Authentifizierung 2012 - ASCO Data Security Alexander Kehl Regional Sales Manager Germany

breaches 2012 - ASCO Data Security Best practices to secure online application login 2

Please log in to get started JohnDoe ******** x8 per day 2012 - ASCO Data Security Best practices to secure online application login 3

Digital Identity x7 apps 2012 - ASCO Data Security Best practices to secure online application login 4

Digital Identity Expanded 25 accounts 2012 - ASCO Data Security Best practices to secure online application login 5

How many passwords do you have? PASSWORD 2% 26% 6 passwords 23% 18% 15% 16% 2012 - ASCO Data Security Best practices to secure online application login 6

2012 - ASCO Data Security Convenient but not Secure Best practices to secure online application login 1 Password 7

Fraud $ Phising, Pharming, Trojan Horses Post-its, stolen PC, 2012 - ASCO Data Security Best practices to secure online application login 8

Bill Gates People use the same password on different systems, they write them down and they just don t meet the challenge for anything you really want to secure 2012 - ASCO Data Security

2012 - ASCO Data Security

Core Activities 2012 - ASCO Data Security Best practices to secure online application login 11

Strong Authentication for REMOTE ACCESS LAN ACCESS CLOUD SERICES & APPLICATIONS WEB PORTAL PAID SUBSCRIPTION SERICE DESKTOP & APPLICATION IRTUALISATION BRING YOUR OWN DEICE ZERO FOOTPRINT DIGITAL SIGNATURE DOCUMENT ACCESS MANAGEMENT DISK OR FILE ENCRYPTION PRE-BOOT AUTHENTICATION DEMATERIAL- ISATION KNOW YOUR CUSTOMER WEB SINGLE- SIGN-ON ENTERPRISE SINGLE-SIGN-ON ACCESS MANAGEMENT 2012 - ASCO Data Security Add your footer in the header and footer section 12

ASCO Philosophy & Perspective Security Ease Cost 2012 - ASCO Data Security Best practices to secure online application login 13

Sold & Deployed world wide GO 3 GO 6 CertiID Key 101 250-251 260-261 270 270 XPress 275 GO 7 GO 100 Key 200 Key 860 301 C 550 560 736 irtual Nano for Mobile 805 800 810 815 820 830 831 835A for Windows for Web 2012 - ASCO Data Security 836 837 840A 840 C 855 865 905 920 Best practices to secure online application login 14

Gaming Industry 2012 - ASCO Data Security Best practices to secure online application login 15

Top 5 Requirements PASSWORD 2% 26% Your Web Application 23% 18% 15% 16% 2012 - ASCO Data Security Best practices to secure online application login 16

Omnipresent dp+ Embedded Chipsets DESS 2012 - ASCO Data Security eid Best practices to secure online application login 17

Get Started Today Sites In Development Sites In Testing Sites Live & Secure 2012 - ASCO Data Security Best practices to secure online application login 18

Join our community! 2012 - ASCO Data Security Best practices to secure online application login 19

Questions ASCO s daily Happy Hour Join us every day between 17.00 and 18.00h for a Belgian beer at our ASCO booth 12.530 2012 - ASCO Data Security

Thank You Alexander Kehl Regional Sales Manager Germany Alexander.Kehl@vasco.com 2012 - ASCO Data Security

Copyright & Trademarks Copyright 2012 ASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of ASCO Data Security. Trademarks ASCO, ACMAN, IDENTIKEY, axsguard, and the logo are registered or unregistered trademarks of ASCO Data Security, Inc. and/or ASCO Data Security International GmbH in the U.S. and other countries Disclaimer of Warranties and Limitations of Liabilities This Report is provided on an 'as is' basis, without any other warranties, or conditions. 2012 - ASCO Data Security Best practices to secure online application login 22