+ All Categories
Home > Documents > An Introduction to CRYPTOCard Date

An Introduction to CRYPTOCard Date

Date post: 25-Feb-2016
Category:
Upload: tallys
View: 66 times
Download: 3 times
Share this document with a friend
Description:
An Introduction to CRYPTOCard Date. Presented by:- A Sales person. At a glance. CRYPTOCard delivers Authentication to secure digital identities We deliver via traditional server & unique SaaS models Broad industry use and dominant in key sectors - PowerPoint PPT Presentation
Popular Tags:
22
An Introduction to CRYPTOCard Date Presented by:- A Sales person
Transcript
Page 1: An Introduction to CRYPTOCard Date

An Introduction to CRYPTOCardDate

Presented by:- A Sales person

Page 2: An Introduction to CRYPTOCard Date

At a glance

• CRYPTOCard delivers Authentication to secure digital identities• We deliver via traditional server & unique SaaS models• Broad industry use and dominant in key sectors

– In the UK we have 24% share in Local Government• B2B focussed

– Our biggest customers have 50,000 – 150,000 seats• Our points of difference are:

– SaaS model– Focus on automation of provisioning and integration– Token quality and range– Low TCO

CRYPTOCard – The Authority in Securing Digital Identities

Page 3: An Introduction to CRYPTOCard Date

CRYPTOCard: A history of innovation

World’s first Mac authentication

solution introduced

Best of Show

MacWorld

Company founded

Linux version introduced

KT-1 Key chain introduced

RB-1 token introduced

SC-1 Smart Card

introduced

UB-1 USB Token introduced

NASA - our first major customer

4

BMW became customer

Apple became customer

AuthEngine introduced

CRYPTO-MAS introduced

Blackberry token

introduced

InnovativeProduct of 2008

SMS Token

introduced

BlackShield IDintroduced

Java Token

launched

KT-4 Key chain introduced

Bombardierbecame customer

Comic Reliefbecame

a customer

CMS-CMSKbecame

a customerYorkshire Building Society became

a Customer

Harrodsbecame customer

GridToken

launched

Isle of Wightbecame

a Customer

Page 4: An Introduction to CRYPTOCard Date

Our Geographic SpreadCoverage and sales in over 70 countries for thousands of companies

North America EMEAStrong growth over past 2 years and

massive potential for the future

KEY FACTS:-Locations: Bristol,

Bracknell, Eindhoven

Focus:- Sales, Marketing, Support

A competitive market in which we have established our

largest customers

KEY FACTS:-Locations: Ottawa

Focus:- Engineering, Operations, Support, Finance,

R o WA tactical market for

the next 2 years

KEY FACTS:-Continuous production

facility in China

Page 5: An Introduction to CRYPTOCard Date

Passwords are the weakest link in the security chain:Nearly every successful Hacking, Phishing or ID theft attempt involves obtaining a password

Expensive to manage

Difficult to audit

Easy to crack

Easy to guessWritten down

Easy to steal

Hard to remember

The problem with passwords

Page 6: An Introduction to CRYPTOCard Date

Many customers have secured their internal network, using managed services to deliver Anti-virus, Firewalls, Content Filtering, Anti-Spam, Anti-Spyware ... BUT.........

....... very few businesses realise that their cloud-based services and remote access networks are a risk – because they are only secured by a static password

The password gremlins

Access Router Firewall

DMZ

Mobile Staff

Wireless

PBX / Phone System

Remote Users

Your peopleBranch Offices

3rd Party Access

Your customers

Workstations

PDA Users

Network Server

Database server

Workstations

Page 7: An Introduction to CRYPTOCard Date

Market opportunity for Authentication

Banking Customer

Access

Enterprise Network Access

Cloud based and on-line services,

web based collaboration

solutions

Flexible working withRemote Access

Market Penetration

Consumers

Partners

Suppliers

Employees

Management

Enterprise Corporate SMB SoHo Consumer

Rate of Deployment

Rate of Adoption

Increasing take-up of

cloud based services and desire for on-

line collaboration tools increase the need for password

replacement solutions

Increasing numbers of

existing users of two-factor are realising

that management

overheads and high product

costs dictate a strategy review

Continued drive for remote access security

and the on-going drive for regulatory compliance

continue to drive take up in new segments

Longer term:- 1. Authentication as part

of an integrated workflow

2. Move to federated ID world using SAML and other open standards

Traditional Authentication market

Market opportunity

Page 8: An Introduction to CRYPTOCard Date

Passwords are easy to hack

"If your company suffered a malicious

attack from a fraudster who stole important

data or brought down critical business

systems what would be the full cost to the

business?“

Jason Hart Senior VP, CRYPTOCard

Page 9: An Introduction to CRYPTOCard Date

The solution is simpleYou already use it – its called an ATM card

3468PIN:

Token with a One-Time Passcode

Something that you know Something that you have

plus

Page 10: An Introduction to CRYPTOCard Date

Our products and services

Database Server products

CRYPTO-MAS Managed Service

Network Server products

RB-1Calculator style

KT-1Rugged Steel Key chain token

KT-4Robust Key chain token

KT-2Polycarbonate Key chain token

SMS-1SMS token

Hardware Multi-Platform

Laptop

BlackBerry

Windows Mobile

Java phones

UB-3USB token

CD-1Credit Card sized

token

On-demand Hybrid

SC-1SmartCard token

IronkeyUltra-Secure Token

GrIDsure

SafeStickUSB device

Page 11: An Introduction to CRYPTOCard Date

CRYPTO-MAS: Simple implementation tools

VPN

Citrix

Web Apps

Outlook

Remote Web Workplace

Terminal Services

Unix Logon

Firewall

Linux/Unix

Active DirectorySynchronization

SSL

VPN

Citrix CAG, WI, AAC

IIS

Apache

NPS/IAS

SMSTokensBlackBerry

Tokens

Key ChainTokens

SoftwareTokens

JAVATokens

Page 12: An Introduction to CRYPTOCard Date

Designed as a service

Significant points of differenceSix primary innovations of CRYPTO-MAS combine to deliver significant benefits

Migration Agent

LDAP Agent

Integration Agents

Simple integrationtools

Simple to use portal

Wide token range

Cloud based architecture

StandardReports included

Page 13: An Introduction to CRYPTOCard Date

CRYPTO-MAS: Simple to adopt and deploy

Applications

TOKENS &USERS

MAS

Access device

SUBSCRIBER COMPANY

Easily integrated and distributed within hours, not days –reducing overheads

= Service Provider = Customer

3

4

5

6 SERVICE PROVIDER

1

2

3

Active Directory

4

Add the Access device to the network

Upload User information

Add tokens

Distribute tokens to users

5

Administrator

6

Set-up the customer administrator

2

Set-up the customer company

1

Page 14: An Introduction to CRYPTOCard Date

BlackShield ID

Knowledge, Simplicity, Choice

Total Authentication, Made Simple

Page 15: An Introduction to CRYPTOCard Date

BlackShield ID: Simple implementation tools

VPN

Citrix

Web Apps

Outlook

Remote Web Workplace

Terminal Services

Unix Logon

Firewall

Linux/Unix

Active DirectorySynchronization

SSL

VPN

Citrix CAG, WI, AAC

IIS 6 / 7

Apache

NPS/IAS

Windows LogonXP/Vista/Win7

BlackShield ID

SMSTokens

BlackBerryTokens

Key ChainTokens

SoftwareTokens

JAVATokens

GRID

iPhoneToken

USBDevices

Page 16: An Introduction to CRYPTOCard Date

Market leading feature set

• Non-expiring licences• Automation of

reporting• Automation of

deployment processes• Agents included

• Key-chain, USB, Grid, S/W and Tokenless

• Customer programmable• Non-expiring• High levels of security

•Compliance based reporting

•Audit trail reports•Database encryption•Automated alerts•Encrypted data links•Database copy protection

• LAN, Web & Access protection

•Work Flow Connectors•Rule based provisioning• Self enrolment• LDAP pre-Auth

Security & Compliance

TCO

Integration

Tokens

Page 17: An Introduction to CRYPTOCard Date

BlackShield ID: Technology brings advantages

Greatly reduced total cost of ownership

Best-in-class security

Simpler, quicker System administration

Straightforward, rapid deployment and integration

Industry-leading performance

Unrivalled end-user experience

All inclusive s/w, Token longevity, Self-enrolment, Self service portal

Security policy support, Secure user deployment, Token initialisation

Browser based i/f, Real-time systems reporting, Management by exception, Workflow Automation

Multiple LDAP integration, Agents included, Fast authentication

.NET based, Fast user look-up, High availability and resilience

Token lifecycle management, Great token range, self service portal, Self enrolment

Page 18: An Introduction to CRYPTOCard Date

When would you deploy CRYPTOCard?

Remote Access If you are providing some kind of access to users or 3rd parties using one of the many options: SSL/VPN, Microsoft, Citrix etc

IP/VPN If you have a VPN from Cisco, Juniper or others you probably have remote workers that need MAS based security

Portals If you are providing internal and external portals for collaboration and data sharing

Firewalls If you have a network that could benefit from additional security

On-Line services As well as remote access you may also now be using Microsoft or Citrix thin client networks

Cloud based services You may have started to use SaaS based applications and so have an urgent need for authentication

Anywhere you use a password!

Page 19: An Introduction to CRYPTOCard Date

Some sample customers

• Our biggest sectors are Finance and Government• In the UK we have 24% share in Local Government• Compliance is increasing penetration in other sectors (Retail, Legal)

• B2B focussed• Our customers range from 10 seats to 150,000 seats

Page 20: An Introduction to CRYPTOCard Date

Example: Stroud & Swindon

Who they are• Based in Swindon, UK• One of 50 UK building societies• Head office with 400 people plus 20 offices

and 20 agencies in south-west England

What they have• Over 60 remote workers

– Financial consultants• SSL/VPN remote access network

What problem they solved• Secure access for confidential client reviews

Key features used• CRYPTO-MAS• Soft tokens

“We tend to outsource those elements of infrastructure services that requires specialist knowledge. Authentication isn’t the kind of thing you’d have to do day-in-day-out, so any skills tend to be lost and the cost of employing key specialists in-house doesn’t make sense any more.”

Colin CampbellIT Services Manager, Stroud & Swindon

Key benefits• Compliance and audit support

– FSA regulations• Secure access from any broadband

connection– Ad-hoc home working– Returning parents– Emergency working

• Lower cost than installing a server• Outsourced IT headache• Token portability

Page 21: An Introduction to CRYPTOCard Date

Key benefits

Example: TTT Moneycorp

Who they are• Based in London, UK• Private and corporate money exchange• Over 600 employees around the world

What they have• Secured web and telephone access by

corporate customers• RB-1 tokens

What problem they solved• Secure access for monetary transfers

Key features used• CRYPTO-MAS• Security with AES256 and Base 32• Flexible payment options

• Freedom of access– Phone or web

• Highest levels of security• Speed and ease of install

– Completed in minutes• Low total cost of ownership

– Outsourced overheads– No upfront investments

“CRYPTO-MAS provided an instant, resilient authentication service. The development and installation took minutes as opposed to days, which is impressive given our stringent standards.”

Thomas KadriDirector of Support ServicesTTT Moneycorp

Page 22: An Introduction to CRYPTOCard Date

Points of difference

The first/only major Authentication vendor to deliver a SaaS model

Total Cost of Ownership over 5 years CRYPTOCard will be over 50% less expensive than other platforms.

CRYPTOCard prides itself on delivering authentication solutions that are easy to use and fast to integrate

CRYPTOCard boasts a high level of automation options for user and token management and administration

CRYPTOCard has a broad and innovative token technology

CRYPTOCard is a pure-play authentication company, has been innovating for more than 20 years and will continue to lead the market.

CloudBased

Affordable

Innovative

Simple to Manage

Focused

Easy to Integrate


Recommended