+ All Categories
Home > Documents > Discover the future of security on Stallion Spring Seminar 2009 Your mobile phone: the ultimate...

Discover the future of security on Stallion Spring Seminar 2009 Your mobile phone: the ultimate...

Date post: 31-Mar-2015
Category:
Upload: marcos-windle
View: 223 times
Download: 5 times
Share this document with a friend
Popular Tags:
19
Discover the future of security on www.cidway.com Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool
Transcript
Page 1: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Discover the future of security on www.cidway.com

Stallion Spring Seminar 2009

Your mobile phone: the ultimate authentication tool

Page 2: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 2

A few words on CIDWAY

• Swiss company based in Lausanne, Switzerland• Over 10 years of experience in authentication and digital signature• International network of strategic partners and resellers• Presence in over 30 countries• Unique proprietary patented technologies for mobile phones and

Homeland security

Page 3: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 3

Addressable markets

Banking Homeland Security

Mobile application GovernmentHealth

Corporate

Page 4: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 4

Business applications

• E-Banking • E-Commerce • E-Government • E-Brokerage• E-Health care• E-Gaming• E-Lottery• E-Government• E-Loyalty• M- Payment

Application Security for Customer security

• Remote Access• Network Security

Enterprise Security for Employee security

• All companies requiring authentication under own brand name

OEM(Original Equipment Manufacturers)

Page 5: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 5

Product portfolio overview

GAIA SDKAuthentication platform SDK

GAIA ServerAuthentication platform

SESAMI MobileTime based OTP Software token for mobile phones

SESAMI Mobile SDKToken SDK for mobile phones

SESAMI SlimTime based OTP Hardware token

SESAMI SMSSMS based OTP for mobile phones

One single authentication platform to answer all security needs and user profiles.

Page 6: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Mobile phones and their impact on our lives

CIDWAY Security SA

Page 7: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 7

By 2015, more that 2 billion people will be using mobile wallets – software that enable consumers to manage their money, including making and receiving payments, using their mobile phone.

Edgar Dunn & Company, 2008

2 billion

Page 8: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 8

Revealing behaviors

While going to work, you realize that you forgot your wallet and mobile phone. What would you do?

• 47% of surveyed people would turnback for the wallet

• 83% of surveyed people would turnback for their mobile phone!

Page 9: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 9

THE RED DOT EFFECT

The mobile phone is becoming an essential part of our professional and personal lives.

Explosion of mobile services and requirements:• Work (e-mail, agenda, remote access, notes, etc.) • Communication (conversations, VoIP, etc.)• Social network (SMS, MMS, Facebook, chat, etc.)• Purchase and payment (parking tickets, ski pass, etc.)• Finance (e-banking, billing, etc.)• Loyalty programs (vouchers, special offers, etc.)• Entertainment (games, broadcasting, etc.)

Page 10: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 10

But identity theft is also increasing…

Most of our identity data and personal details are duplicable, reproducible

and reusable.

Statistics show that overall common attacks will double each year.

Common attacks are:• Brute force• PIN predilection• Keyloggers• Password sniffers• Phishing• Man in the middle attack (MITM)• Reverse ingeneering

Page 11: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Why choose mobile authentication solutions?

CIDWAY Security SA

Page 12: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 12

• Worldwide financial crisis results in cost reduction initiatives• New and alternative cost saving methods are sought• Security remains a key priority• Market end users now looking for a product to challenge the market• Mobile Penetration rates continue to increase in emerging markets• Attractive price point

CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software

tokens.

Economic crisis – Opportunity for Mobile Solutions

Page 13: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 13

Why choose mobile against other authentication methods

• Hardware tokens are secure but…o Very expensiveo Not in the spirit of mobility (one token per access)o Time limited (replacement, etc.)o Not scaled for large deployments (ref. logistics, maintenance, etc.)

• SMS are flexible and scaled for large deployments but…o Are less secureo Subject to recurring costso Rely on network and operators

• Mobile software tokens are…o Securedo Autonomouso Flexible (no limit of tokens on mobile)o Unlimitedo Scaled for large deployments

Page 14: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Why choose CIDWAY?

CIDWAY Security SA

Page 15: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 15

Why choose CIDWAY’s mobile solutions?

Security

• Algorithm and Time based One Time Passwords

• Patented PIN protection in case of theft or loss of device (PIN is not stored on mobile or transmitted externally)

• Protection against any form of attacks, such as• Cloning• Brute force• PIN Predilection• Keyloggers• Phishing• Man in the middle attack (MITM)• Reverse engineering

• Secured registration, activation and deployment

• Automatic time synchronization

Page 16: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 16

Why choose CIDWAY’s mobile solutions?

Compatibility and integration

• Multi-OS• Java• Symbian• Blackberry• Windows CE & Pocket PC• Palm OS• Iphone

• Standalone or SDK mobile token & server

• Easy integration into 3rd party mobile applications

• Freedom of deployment scenarios (Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.)

Page 17: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 17

Why choose CIDWAY’s mobile solutions?

Rationalization of costs

• One device and one PIN for all your authentication needs (no need to carry different tokens)

• Multi-Channel

• Versatility (authentication, document signature, etc.)

• Unlimited life span (ref. software)

• No on-going maintenance or replacement costs

• Free of network and operators (no hidden costs)

• Up to 2/3 of cost reduction vs traditional solutions

Page 18: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 18

Why choose CIDWAY’s mobile solutions?

USER FRIENDLINESS

• Easy and intuitive solution

• Use of one familiar device

• Continuous evolution of software

• Create new added value services

Page 19: Discover the future of security on  Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.

Thank you

Christophe Guignard –Marketing & Communication Manager

Av. Juste-Olivier 11, 1006 Lausanne – Suisse

Tél: +41 21 331 27 00 – Fax: +41 21 331 27 09 - Email: [email protected]

For more information, please visit www.cidway.com


Recommended