SlideShare a Scribd company logo
1 of 30
Download to read offline
Top Things to Consider When
Authenticating Web Applications
© 2013 - VASCO Data Security

November 2013
Increasing need to protect our online activities
End users

! 
! 
! 
! 

Confidential data leakage
Cyber bullying
“Gold farming”
Identity theft

2012: Hackers able to
access users’ personal
data for use in phishing
attacks

2012: Hacker able to
access billing
information and other
accounts

© 2013 - VASCO Data Security

2012: Exposed 6
million user account
passwords

ASP’s

! 
! 
! 
! 

Lost revenues
Tarnished brand
Low data integrity
Subscriber churn

2013: Hackers posted
fake news about bombing
of the White House, Dow
Jones dropped 100 points

2013: 10 million people
watch Netflix without
paying for it by sharing
passwords

2013: Hackers able to
access customer names,
credit/debit cards and
expiration dates of 2.9
million customers, and up
to 38 million ID’s and
passwords

2
Agenda
!  Applications and pain points
!  Cloud services
!  Subscription services
!  Gaming

! 
! 
! 
! 

Quick VASCO background
Combined AMD and VASCO solution
Sample business case
Sample competitive comparison

© 2013 - VASCO Data Security

3
Cloud Security Concerns
!  Losing files
!  Files not stored securely
!  Loss of control
!  Embarrassing files made public
!  Computer viruses

© 2013 - VASCO Data Security

Source: Halon 2013 Security Survey

4
Cloud Providers Are Expected to Lead on Security
Within five years, cloud security will become one of the
primary drivers for adopting cloud computing. The reason
for a shift of security from obstacle to driver is that Cloud
Service Providers (CSPs) are expected to invest far
more in the development of their security
infrastructure and expertise than any typical enterprise
Ernst and Young: Cloud Computing Issues and Impacts, 2011

© 2013 - VASCO Data Security

5
Subscription Sharing: New York Times Analysis

BuzzFeed: It is representative of a rising generation of young people who
1) Like watching shows Online and 2) Cannot fathom paying for them
© 2013 - VASCO Data Security

6
Subscription Account Sharing Impacts	
  
!  Eliminate revenue leakage from
account sharing
!  Account sharing is perceived as a
back-end security problem. But for
companies that rely on online
subscriptions as a primary revenue
stream, account sharing can mean
lost income
!  What we found was that about 33
percent of the accounts on the
network were being shared

!  Secure personal information
!  Preserve data integrity for
advertising/marketing
"If you're running The Wall Street Journal or World of Warcraft, and you've got multiple
people sharing a single subscription, you're losing customers."
© 2013 - VASCO Data Security

Source: AdmitOne

7
Tier 1 ASP Example
Company Profile
! 

One of the world's largest insight, information and
consultancy networks. By connecting its specialist
companies, the group aims to become the pre-eminent
provider of compelling insights for the global business
community.

Needs
! 
! 
! 
! 
! 

Protect online assets/revenues and control their IP
Auditable and traceable accounts for Risk and Compliance
Dept.
No new overhead or code modification of existing web
portals
OpEx based purchases to tie to subscription services and
improve cash flow
Everything IT must move to the cloud

In need of a cloud based two-factor authentication platform
© 2013 - VASCO Data Security

8
Creating Secure Communities Raises Revenues

!  University of Michigan studied a Tier 1
online retailer
!  Study found a 19% increase in
revenue when customers were
connected in an online community

“While the major share of firm and
media attention has focused on thirdparty online social networks such as
Facebook, many firms have made the
choice to build their own such
networks.”
http://info.socious.com/bid/56237/How-Online-Customer-Communities-Can-Increase-Revenue-By-19-Research

© 2013 - VASCO Data Security

9
Current state of Gaming
Online	
  gaming	
  industry	
  growing	
  significantly…..	
  

…..however	
  ARPU	
  is	
  steadily	
  declining	
  

Online	
  Gaming	
  Market	
  Share	
  by	
  Geography	
  (USD	
  $B)

	
  $20.0
	
  $18.0

	
  $16.0
	
  $14.0
	
  $12.0

	
  $10.0

ROW

	
  $8.0

US

	
  $6.0

	
  $4.0
	
  $2.0
	
  $-­‐
2012

2013

2014

2015

Publishers need assistance to stabilize ARPU by providing
additional value to paying customers
© 2013 - VASCO Data Security

Source: SuperData Research and Newzoo Games

10
US Gaming Demographics
117m	
  Online	
  Gamers	
  in	
  the	
  US	
  

Typical US Gamer
Age 25-44
Income $35k-$75k
60% male
79% college degree

© 2013 - VASCO Data Security

Affinity	
  to	
  online	
  security	
  

1.  Above average income and education
2.  Tech savvy
3.  Understand the value of security

Sources: *Nielsen Entertainment's third annual Active Gamer Benchmark Study; ** StatGrab; ***SuperData Research/Newzoo

11
Gaming companies must capitalize on hits
!  Example: Diablo 3
!  Fastest selling PC game to date
!  Broke Amazon record for most preorders
!  Sold 3.5m copies on the 1st day
!  Sold 6m copies in 1st week
!  Within 1 week, it became the most
played game in Korea, 39% of Korean
gamers logging in daily

Securing new game revenue is a natural fit
© 2013 - VASCO Data Security

12
Gaming ASP Pain Points
!  Account sharing
!  Increase revenues and subscriptions with stronger
authentication
!  New releases are very competitive, must capitalize on hits

!  Account bullying
!  Hackers stealing credentials to tamper with account holders

!  Gold farming
!  Dissatisfaction lowers switching costs and increases churn
!  Less of an issue with advent of free to play and ability to buy/sell
with real dollars

!  User islands
!  Create communities of users to increase stickiness and
monetize free to play
!  Cross sell gaming assets
!  One credential to access all game sites
“MMO players are very dedicated gamers. As the majority already plays games on other screens, it will be interesting
to see if publishers succeed in extending and monetizing their MMO experience across all screens.“
Peter Warman, CEO of Newzoo
© 2013 - VASCO Data Security

13
Agenda
!  Applications and pain points
!  Cloud services
!  Subscription services
!  Gaming

! 
! 
! 
! 

Quick VASCO background
Combined AMD and VASCO solution
Sample business case
Sample competitive comparison

© 2013 - VASCO Data Security

14
Our Philosophy

Security

Ease

Cost

Find the optimal balance for ASPs and consumers

© 2013 - VASCO Data Security

Federal Reserve Briefing

15
VASCO Heritage in Banking Security

© 2013 - VASCO Data Security

16
Agenda
!  Applications and pain points
!  Cloud services
!  Subscription services
!  Gaming

! 
! 
! 
! 

Quick VASCO background
Combined AMD and VASCO solution
Sample business case
Sample competitive comparison

© 2013 - VASCO Data Security

17
Secure Portal to Web Apps
App1

App2

Numerous
Logins
Passwords
QR code scan

App3

App4

Cloud Subscribers

OTP

App5

App6

Complex for users, headache IT helpdesk
Simple for users, savings for for IT helpdesk
© 2013 - VASCO Data Security

18
18
Integration overview
AMD	
  chipset	
  
Normal	
  SecDon	
  
App	
  

App	
  

Secure	
  SecDon	
  
App	
  

Trusted	
   Trusted	
  
App	
  
App	
  
Secure	
  OS	
  

TEE	
  Client	
  API	
  
PlaBorm/Rich	
  OS	
  
(e.g.	
  Windows,	
  etc)	
  

DIGIPASS	
  

(TEE)	
  

Secure	
  
Monitor	
  

Secure	
  Boot	
  

ARM	
  Cortex	
  A5	
  Processor	
  with	
  Trustzone	
  Security	
  Extensions	
  

© 2013 - VASCO Data Security

19
Highly secure yet familiar, simple user experience

© 2013 - VASCO Data Security

20
Agenda
!  Applications and pain points
!  Cloud services
!  Subscription services
!  Gaming

! 
! 
! 
! 

Quick VASCO background
Combined AMD and VASCO solution
Sample business case
Sample competitive comparison

© 2013 - VASCO Data Security

21
Cost Effective Cloud

Cost
per
user

Opex Model
Pay as you grow
Users or Authentications

© 2013 - VASCO Data Security

22
MYDIGIPASS.COM Subscription Business Case
ASP with 1M users per month

Increased Subscription Assumptions:
•  Per a Tier 1 subscription account, 2FA will
increase revenues by 10% in YR 1
increasing to 20% by YR 5
•  $100 annual subscription revenue
•  $10 per user 2FA cost

20,000,000

16,000,000

12,000,000

Incremental revenues
Incremental costs
8,000,000

4,000,000

YR 1

YR 2

YR 3

YR 4

YR 5

MDP.com would return $17.5M net profit over 5 years.
© 2013 - VASCO Data Security

23
Easily Deployed Two Factor Authentication

© 2013 - VASCO Data Security

24
Agenda
!  Applications and pain points
!  Cloud services
!  Subscription services
!  Gaming

! 
! 
! 
! 

Quick VASCO background
Combined AMD and VASCO solution
Sample business case
Sample competitive comparison

© 2013 - VASCO Data Security

25
Comparison vs. Home Grown SMS
Home Grown SMS

Your unique
code is
w2z356

Does not operate on WiFi
Not delivered in poor coverage area
Not delivered when out of range
Not delivered under heavy traffic
congestion
Over 5% of SMS deliveries fail*
Operates on 3G/4G, WiFi or LAN

Over 9% take over 5 minutes*
* Per UCLA study Analysis of the Reliability of
a Nationwide Short Message Service

© 2013 - VASCO Data Security

26
Spying on SMS
Home Grown SMS

Your unique
code is
w2z356

Your unique
code is
w2z356

Secure out of band QR code
transmission
© 2013 - VASCO Data Security

Unsecure text message can be
intercepted using off the shelf
software
27
Baseline Mobile App Security
Home Grown SMS

Your unique
code is
w2z356

Federate Multiple
Applications
No

Federate Multiple Applications
YES
Incremental SMS Opex
NO
Authentication method
Challenge/response - more secure

Incremental SMS Opex
YES
Authentication method
Standard OTP
Back-up methods
Written code

Back-up methods
Smartphone
Hardware token
© 2013 - VASCO Data Security

28
Top Things to Remember for ASP’s
!  Are you creating a secure cloud community?
!  Application
!  Delivery

!  Is account vulnerability limiting your revenue growth?
!  Losing potential customers
!  High cost of fixing account hacking events
!  Causing customer churn

!  Could strong two-factor authentication in the cloud
meet your needs?
!  Speedy ROI
!  Easy to manage / Easy for users
!  More secure than SMS
© 2013 - VASCO Data Security

29
For More Information
!  Contact us at
!  martin.ahlers@vasco.com
!  jonathan.abon@vasco.com
!  And go to our Application Service Provider site
!  http://mydigipass.vasco.com/

© 2013 - VASCO Data Security

30

More Related Content

What's hot

Ayla Networks IoT Platform & Use Cases
Ayla Networks IoT Platform & Use CasesAyla Networks IoT Platform & Use Cases
Ayla Networks IoT Platform & Use CasesInternet of Things DC
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. Marketing Team
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBMArrow ECS UK
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Wilfried Grommen
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - splitPhuc (Peter) Huynh
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
electric imp Intro
electric imp Introelectric imp Intro
electric imp IntroMatt Haines
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Top 10 reasons your IoT project will fail
Top 10 reasons your IoT project will failTop 10 reasons your IoT project will fail
Top 10 reasons your IoT project will failYodit Stanton
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
 
redhat-IoT_use_cases-DavidBericat
redhat-IoT_use_cases-DavidBericatredhat-IoT_use_cases-DavidBericat
redhat-IoT_use_cases-DavidBericatDavid Bericat
 
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast ITThe power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast ITCisco Canada
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Jon Stevens-Hall
 

What's hot (20)

Ayla Networks IoT Platform & Use Cases
Ayla Networks IoT Platform & Use CasesAyla Networks IoT Platform & Use Cases
Ayla Networks IoT Platform & Use Cases
 
Building IoT Solutions 101
Building IoT Solutions 101Building IoT Solutions 101
Building IoT Solutions 101
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen.
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Watson IOT Platform
Watson IOT PlatformWatson IOT Platform
Watson IOT Platform
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBM
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
electric imp Intro
electric imp Introelectric imp Intro
electric imp Intro
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Top 10 reasons your IoT project will fail
Top 10 reasons your IoT project will failTop 10 reasons your IoT project will fail
Top 10 reasons your IoT project will fail
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
IBM Watson IOT
IBM Watson IOTIBM Watson IOT
IBM Watson IOT
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in Oracle
 
redhat-IoT_use_cases-DavidBericat
redhat-IoT_use_cases-DavidBericatredhat-IoT_use_cases-DavidBericat
redhat-IoT_use_cases-DavidBericat
 
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast ITThe power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
 

Similar to SE-4110, Securing Identities in the Cloud, by Martin Ahlers

ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Amaghrouri accomplishments
Amaghrouri accomplishmentsAmaghrouri accomplishments
Amaghrouri accomplishmentsAdam Maghrouri
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesimmixGroup
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityTenable Network Security
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retailCloudera, Inc.
 
Microsoft nine things we learned about cloud compliance latin america
Microsoft   nine things we learned about cloud compliance latin americaMicrosoft   nine things we learned about cloud compliance latin america
Microsoft nine things we learned about cloud compliance latin americaRobert Ivanschitz
 
Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Robert Ivanschitz
 
Databases, CAP, ACID, BASE, NoSQL... oh my!
Databases, CAP, ACID, BASE, NoSQL... oh my!Databases, CAP, ACID, BASE, NoSQL... oh my!
Databases, CAP, ACID, BASE, NoSQL... oh my!DATAVERSITY
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionBasil Hashem
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 

Similar to SE-4110, Securing Identities in the Cloud, by Martin Ahlers (20)

MYDIGIPASS.COM
MYDIGIPASS.COMMYDIGIPASS.COM
MYDIGIPASS.COM
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Amaghrouri accomplishments
Amaghrouri accomplishmentsAmaghrouri accomplishments
Amaghrouri accomplishments
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retail
 
Microsoft nine things we learned about cloud compliance latin america
Microsoft   nine things we learned about cloud compliance latin americaMicrosoft   nine things we learned about cloud compliance latin america
Microsoft nine things we learned about cloud compliance latin america
 
Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"
 
Databases, CAP, ACID, BASE, NoSQL... oh my!
Databases, CAP, ACID, BASE, NoSQL... oh my!Databases, CAP, ACID, BASE, NoSQL... oh my!
Databases, CAP, ACID, BASE, NoSQL... oh my!
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout Session
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 

More from AMD Developer Central

DX12 & Vulkan: Dawn of a New Generation of Graphics APIs
DX12 & Vulkan: Dawn of a New Generation of Graphics APIsDX12 & Vulkan: Dawn of a New Generation of Graphics APIs
DX12 & Vulkan: Dawn of a New Generation of Graphics APIsAMD Developer Central
 
Leverage the Speed of OpenCL™ with AMD Math Libraries
Leverage the Speed of OpenCL™ with AMD Math LibrariesLeverage the Speed of OpenCL™ with AMD Math Libraries
Leverage the Speed of OpenCL™ with AMD Math LibrariesAMD Developer Central
 
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware Webinar
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware WebinarAn Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware Webinar
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware WebinarAMD Developer Central
 
Webinar: Whats New in Java 8 with Develop Intelligence
Webinar: Whats New in Java 8 with Develop IntelligenceWebinar: Whats New in Java 8 with Develop Intelligence
Webinar: Whats New in Java 8 with Develop IntelligenceAMD Developer Central
 
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...AMD Developer Central
 
TressFX The Fast and The Furry by Nicolas Thibieroz
TressFX The Fast and The Furry by Nicolas ThibierozTressFX The Fast and The Furry by Nicolas Thibieroz
TressFX The Fast and The Furry by Nicolas ThibierozAMD Developer Central
 
Rendering Battlefield 4 with Mantle by Yuriy ODonnell
Rendering Battlefield 4 with Mantle by Yuriy ODonnellRendering Battlefield 4 with Mantle by Yuriy ODonnell
Rendering Battlefield 4 with Mantle by Yuriy ODonnellAMD Developer Central
 
Low-level Shader Optimization for Next-Gen and DX11 by Emil Persson
Low-level Shader Optimization for Next-Gen and DX11 by Emil PerssonLow-level Shader Optimization for Next-Gen and DX11 by Emil Persson
Low-level Shader Optimization for Next-Gen and DX11 by Emil PerssonAMD Developer Central
 
Direct3D12 and the Future of Graphics APIs by Dave Oldcorn
Direct3D12 and the Future of Graphics APIs by Dave OldcornDirect3D12 and the Future of Graphics APIs by Dave Oldcorn
Direct3D12 and the Future of Graphics APIs by Dave OldcornAMD Developer Central
 
Introduction to Direct 3D 12 by Ivan Nevraev
Introduction to Direct 3D 12 by Ivan NevraevIntroduction to Direct 3D 12 by Ivan Nevraev
Introduction to Direct 3D 12 by Ivan NevraevAMD Developer Central
 
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth Thomas
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth ThomasHoly smoke! Faster Particle Rendering using Direct Compute by Gareth Thomas
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth ThomasAMD Developer Central
 
Computer Vision Powered by Heterogeneous System Architecture (HSA) by Dr. Ha...
Computer Vision Powered by Heterogeneous System Architecture (HSA) by  Dr. Ha...Computer Vision Powered by Heterogeneous System Architecture (HSA) by  Dr. Ha...
Computer Vision Powered by Heterogeneous System Architecture (HSA) by Dr. Ha...AMD Developer Central
 
Productive OpenCL Programming An Introduction to OpenCL Libraries with Array...
Productive OpenCL Programming An Introduction to OpenCL Libraries  with Array...Productive OpenCL Programming An Introduction to OpenCL Libraries  with Array...
Productive OpenCL Programming An Introduction to OpenCL Libraries with Array...AMD Developer Central
 
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14AMD Developer Central
 

More from AMD Developer Central (20)

DX12 & Vulkan: Dawn of a New Generation of Graphics APIs
DX12 & Vulkan: Dawn of a New Generation of Graphics APIsDX12 & Vulkan: Dawn of a New Generation of Graphics APIs
DX12 & Vulkan: Dawn of a New Generation of Graphics APIs
 
Leverage the Speed of OpenCL™ with AMD Math Libraries
Leverage the Speed of OpenCL™ with AMD Math LibrariesLeverage the Speed of OpenCL™ with AMD Math Libraries
Leverage the Speed of OpenCL™ with AMD Math Libraries
 
Introduction to Node.js
Introduction to Node.jsIntroduction to Node.js
Introduction to Node.js
 
Media SDK Webinar 2014
Media SDK Webinar 2014Media SDK Webinar 2014
Media SDK Webinar 2014
 
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware Webinar
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware WebinarAn Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware Webinar
An Introduction to OpenCL™ Programming with AMD GPUs - AMD & Acceleware Webinar
 
DirectGMA on AMD’S FirePro™ GPUS
DirectGMA on AMD’S  FirePro™ GPUSDirectGMA on AMD’S  FirePro™ GPUS
DirectGMA on AMD’S FirePro™ GPUS
 
Webinar: Whats New in Java 8 with Develop Intelligence
Webinar: Whats New in Java 8 with Develop IntelligenceWebinar: Whats New in Java 8 with Develop Intelligence
Webinar: Whats New in Java 8 with Develop Intelligence
 
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...
The Small Batch (and other) solutions in Mantle API, by Guennadi Riguer, Mant...
 
Inside XBox- One, by Martin Fuller
Inside XBox- One, by Martin FullerInside XBox- One, by Martin Fuller
Inside XBox- One, by Martin Fuller
 
TressFX The Fast and The Furry by Nicolas Thibieroz
TressFX The Fast and The Furry by Nicolas ThibierozTressFX The Fast and The Furry by Nicolas Thibieroz
TressFX The Fast and The Furry by Nicolas Thibieroz
 
Rendering Battlefield 4 with Mantle by Yuriy ODonnell
Rendering Battlefield 4 with Mantle by Yuriy ODonnellRendering Battlefield 4 with Mantle by Yuriy ODonnell
Rendering Battlefield 4 with Mantle by Yuriy ODonnell
 
Low-level Shader Optimization for Next-Gen and DX11 by Emil Persson
Low-level Shader Optimization for Next-Gen and DX11 by Emil PerssonLow-level Shader Optimization for Next-Gen and DX11 by Emil Persson
Low-level Shader Optimization for Next-Gen and DX11 by Emil Persson
 
Gcn performance ftw by stephan hodes
Gcn performance ftw by stephan hodesGcn performance ftw by stephan hodes
Gcn performance ftw by stephan hodes
 
Inside XBOX ONE by Martin Fuller
Inside XBOX ONE by Martin FullerInside XBOX ONE by Martin Fuller
Inside XBOX ONE by Martin Fuller
 
Direct3D12 and the Future of Graphics APIs by Dave Oldcorn
Direct3D12 and the Future of Graphics APIs by Dave OldcornDirect3D12 and the Future of Graphics APIs by Dave Oldcorn
Direct3D12 and the Future of Graphics APIs by Dave Oldcorn
 
Introduction to Direct 3D 12 by Ivan Nevraev
Introduction to Direct 3D 12 by Ivan NevraevIntroduction to Direct 3D 12 by Ivan Nevraev
Introduction to Direct 3D 12 by Ivan Nevraev
 
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth Thomas
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth ThomasHoly smoke! Faster Particle Rendering using Direct Compute by Gareth Thomas
Holy smoke! Faster Particle Rendering using Direct Compute by Gareth Thomas
 
Computer Vision Powered by Heterogeneous System Architecture (HSA) by Dr. Ha...
Computer Vision Powered by Heterogeneous System Architecture (HSA) by  Dr. Ha...Computer Vision Powered by Heterogeneous System Architecture (HSA) by  Dr. Ha...
Computer Vision Powered by Heterogeneous System Architecture (HSA) by Dr. Ha...
 
Productive OpenCL Programming An Introduction to OpenCL Libraries with Array...
Productive OpenCL Programming An Introduction to OpenCL Libraries  with Array...Productive OpenCL Programming An Introduction to OpenCL Libraries  with Array...
Productive OpenCL Programming An Introduction to OpenCL Libraries with Array...
 
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14
Rendering Battlefield 4 with Mantle by Johan Andersson - AMD at GDC14
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

SE-4110, Securing Identities in the Cloud, by Martin Ahlers

  • 1. Top Things to Consider When Authenticating Web Applications © 2013 - VASCO Data Security November 2013
  • 2. Increasing need to protect our online activities End users !  !  !  !  Confidential data leakage Cyber bullying “Gold farming” Identity theft 2012: Hackers able to access users’ personal data for use in phishing attacks 2012: Hacker able to access billing information and other accounts © 2013 - VASCO Data Security 2012: Exposed 6 million user account passwords ASP’s !  !  !  !  Lost revenues Tarnished brand Low data integrity Subscriber churn 2013: Hackers posted fake news about bombing of the White House, Dow Jones dropped 100 points 2013: 10 million people watch Netflix without paying for it by sharing passwords 2013: Hackers able to access customer names, credit/debit cards and expiration dates of 2.9 million customers, and up to 38 million ID’s and passwords 2
  • 3. Agenda !  Applications and pain points !  Cloud services !  Subscription services !  Gaming !  !  !  !  Quick VASCO background Combined AMD and VASCO solution Sample business case Sample competitive comparison © 2013 - VASCO Data Security 3
  • 4. Cloud Security Concerns !  Losing files !  Files not stored securely !  Loss of control !  Embarrassing files made public !  Computer viruses © 2013 - VASCO Data Security Source: Halon 2013 Security Survey 4
  • 5. Cloud Providers Are Expected to Lead on Security Within five years, cloud security will become one of the primary drivers for adopting cloud computing. The reason for a shift of security from obstacle to driver is that Cloud Service Providers (CSPs) are expected to invest far more in the development of their security infrastructure and expertise than any typical enterprise Ernst and Young: Cloud Computing Issues and Impacts, 2011 © 2013 - VASCO Data Security 5
  • 6. Subscription Sharing: New York Times Analysis BuzzFeed: It is representative of a rising generation of young people who 1) Like watching shows Online and 2) Cannot fathom paying for them © 2013 - VASCO Data Security 6
  • 7. Subscription Account Sharing Impacts   !  Eliminate revenue leakage from account sharing !  Account sharing is perceived as a back-end security problem. But for companies that rely on online subscriptions as a primary revenue stream, account sharing can mean lost income !  What we found was that about 33 percent of the accounts on the network were being shared !  Secure personal information !  Preserve data integrity for advertising/marketing "If you're running The Wall Street Journal or World of Warcraft, and you've got multiple people sharing a single subscription, you're losing customers." © 2013 - VASCO Data Security Source: AdmitOne 7
  • 8. Tier 1 ASP Example Company Profile !  One of the world's largest insight, information and consultancy networks. By connecting its specialist companies, the group aims to become the pre-eminent provider of compelling insights for the global business community. Needs !  !  !  !  !  Protect online assets/revenues and control their IP Auditable and traceable accounts for Risk and Compliance Dept. No new overhead or code modification of existing web portals OpEx based purchases to tie to subscription services and improve cash flow Everything IT must move to the cloud In need of a cloud based two-factor authentication platform © 2013 - VASCO Data Security 8
  • 9. Creating Secure Communities Raises Revenues !  University of Michigan studied a Tier 1 online retailer !  Study found a 19% increase in revenue when customers were connected in an online community “While the major share of firm and media attention has focused on thirdparty online social networks such as Facebook, many firms have made the choice to build their own such networks.” http://info.socious.com/bid/56237/How-Online-Customer-Communities-Can-Increase-Revenue-By-19-Research © 2013 - VASCO Data Security 9
  • 10. Current state of Gaming Online  gaming  industry  growing  significantly…..   …..however  ARPU  is  steadily  declining   Online  Gaming  Market  Share  by  Geography  (USD  $B)  $20.0  $18.0  $16.0  $14.0  $12.0  $10.0 ROW  $8.0 US  $6.0  $4.0  $2.0  $-­‐ 2012 2013 2014 2015 Publishers need assistance to stabilize ARPU by providing additional value to paying customers © 2013 - VASCO Data Security Source: SuperData Research and Newzoo Games 10
  • 11. US Gaming Demographics 117m  Online  Gamers  in  the  US   Typical US Gamer Age 25-44 Income $35k-$75k 60% male 79% college degree © 2013 - VASCO Data Security Affinity  to  online  security   1.  Above average income and education 2.  Tech savvy 3.  Understand the value of security Sources: *Nielsen Entertainment's third annual Active Gamer Benchmark Study; ** StatGrab; ***SuperData Research/Newzoo 11
  • 12. Gaming companies must capitalize on hits !  Example: Diablo 3 !  Fastest selling PC game to date !  Broke Amazon record for most preorders !  Sold 3.5m copies on the 1st day !  Sold 6m copies in 1st week !  Within 1 week, it became the most played game in Korea, 39% of Korean gamers logging in daily Securing new game revenue is a natural fit © 2013 - VASCO Data Security 12
  • 13. Gaming ASP Pain Points !  Account sharing !  Increase revenues and subscriptions with stronger authentication !  New releases are very competitive, must capitalize on hits !  Account bullying !  Hackers stealing credentials to tamper with account holders !  Gold farming !  Dissatisfaction lowers switching costs and increases churn !  Less of an issue with advent of free to play and ability to buy/sell with real dollars !  User islands !  Create communities of users to increase stickiness and monetize free to play !  Cross sell gaming assets !  One credential to access all game sites “MMO players are very dedicated gamers. As the majority already plays games on other screens, it will be interesting to see if publishers succeed in extending and monetizing their MMO experience across all screens.“ Peter Warman, CEO of Newzoo © 2013 - VASCO Data Security 13
  • 14. Agenda !  Applications and pain points !  Cloud services !  Subscription services !  Gaming !  !  !  !  Quick VASCO background Combined AMD and VASCO solution Sample business case Sample competitive comparison © 2013 - VASCO Data Security 14
  • 15. Our Philosophy Security Ease Cost Find the optimal balance for ASPs and consumers © 2013 - VASCO Data Security Federal Reserve Briefing 15
  • 16. VASCO Heritage in Banking Security © 2013 - VASCO Data Security 16
  • 17. Agenda !  Applications and pain points !  Cloud services !  Subscription services !  Gaming !  !  !  !  Quick VASCO background Combined AMD and VASCO solution Sample business case Sample competitive comparison © 2013 - VASCO Data Security 17
  • 18. Secure Portal to Web Apps App1 App2 Numerous Logins Passwords QR code scan App3 App4 Cloud Subscribers OTP App5 App6 Complex for users, headache IT helpdesk Simple for users, savings for for IT helpdesk © 2013 - VASCO Data Security 18 18
  • 19. Integration overview AMD  chipset   Normal  SecDon   App   App   Secure  SecDon   App   Trusted   Trusted   App   App   Secure  OS   TEE  Client  API   PlaBorm/Rich  OS   (e.g.  Windows,  etc)   DIGIPASS   (TEE)   Secure   Monitor   Secure  Boot   ARM  Cortex  A5  Processor  with  Trustzone  Security  Extensions   © 2013 - VASCO Data Security 19
  • 20. Highly secure yet familiar, simple user experience © 2013 - VASCO Data Security 20
  • 21. Agenda !  Applications and pain points !  Cloud services !  Subscription services !  Gaming !  !  !  !  Quick VASCO background Combined AMD and VASCO solution Sample business case Sample competitive comparison © 2013 - VASCO Data Security 21
  • 22. Cost Effective Cloud Cost per user Opex Model Pay as you grow Users or Authentications © 2013 - VASCO Data Security 22
  • 23. MYDIGIPASS.COM Subscription Business Case ASP with 1M users per month Increased Subscription Assumptions: •  Per a Tier 1 subscription account, 2FA will increase revenues by 10% in YR 1 increasing to 20% by YR 5 •  $100 annual subscription revenue •  $10 per user 2FA cost 20,000,000 16,000,000 12,000,000 Incremental revenues Incremental costs 8,000,000 4,000,000 YR 1 YR 2 YR 3 YR 4 YR 5 MDP.com would return $17.5M net profit over 5 years. © 2013 - VASCO Data Security 23
  • 24. Easily Deployed Two Factor Authentication © 2013 - VASCO Data Security 24
  • 25. Agenda !  Applications and pain points !  Cloud services !  Subscription services !  Gaming !  !  !  !  Quick VASCO background Combined AMD and VASCO solution Sample business case Sample competitive comparison © 2013 - VASCO Data Security 25
  • 26. Comparison vs. Home Grown SMS Home Grown SMS Your unique code is w2z356 Does not operate on WiFi Not delivered in poor coverage area Not delivered when out of range Not delivered under heavy traffic congestion Over 5% of SMS deliveries fail* Operates on 3G/4G, WiFi or LAN Over 9% take over 5 minutes* * Per UCLA study Analysis of the Reliability of a Nationwide Short Message Service © 2013 - VASCO Data Security 26
  • 27. Spying on SMS Home Grown SMS Your unique code is w2z356 Your unique code is w2z356 Secure out of band QR code transmission © 2013 - VASCO Data Security Unsecure text message can be intercepted using off the shelf software 27
  • 28. Baseline Mobile App Security Home Grown SMS Your unique code is w2z356 Federate Multiple Applications No Federate Multiple Applications YES Incremental SMS Opex NO Authentication method Challenge/response - more secure Incremental SMS Opex YES Authentication method Standard OTP Back-up methods Written code Back-up methods Smartphone Hardware token © 2013 - VASCO Data Security 28
  • 29. Top Things to Remember for ASP’s !  Are you creating a secure cloud community? !  Application !  Delivery !  Is account vulnerability limiting your revenue growth? !  Losing potential customers !  High cost of fixing account hacking events !  Causing customer churn !  Could strong two-factor authentication in the cloud meet your needs? !  Speedy ROI !  Easy to manage / Easy for users !  More secure than SMS © 2013 - VASCO Data Security 29
  • 30. For More Information !  Contact us at !  martin.ahlers@vasco.com !  jonathan.abon@vasco.com !  And go to our Application Service Provider site !  http://mydigipass.vasco.com/ © 2013 - VASCO Data Security 30