Strong authentication for the emerging markets. jouni h. leinonen, tectia corporation.

1,171 views
1,082 views

Published on

Seminar on Information and Network Security for Emerging Markets. Presentation material 20-21.9.2011.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,171
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Strong authentication for the emerging markets. jouni h. leinonen, tectia corporation.

  1. 1. Strong Authentication for the Emerging Markets Challenges of and solutions for strong authentication <ul><li>Dr. Jouni H. Leinonen, EVP & COO </li></ul><ul><li>September 21, 2011 </li></ul>
  2. 2. How to authenticate remote users? <ul><ul><ul><ul><ul><li>Authentication is generally required for remote users and various external stakeholders </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Several applications and use cases </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Dynamic environment and user base with various needs and requirements </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>How to detect fraud access </li></ul></ul></ul></ul></ul>Key challenges in authentication Remote workers Business partners Ad-hoc remote accounts End users, consumers Trading partners Outsourced employees Suppliers, vendors External services Common drivers for authentication
  3. 3. National cyber security policies, outsourcing, internet penetration, ICT investments, E-governance and E-commerce initiatives, hacking threats etc. are driving the need for strong authentication of the users also in South Africa, United Arab Emirates and India. Growing need for strong authentication
  4. 4. <ul><li>What does strong authentication mean? </li></ul><ul><ul><li>Authentication is based on two of the following factors: </li></ul></ul><ul><ul><li>Something you know e.g. a password or PIN </li></ul></ul><ul><ul><li>Something you have e.g. token or mobile phone </li></ul></ul><ul><ul><li>Something you are e.g. finger print </li></ul></ul><ul><li>Evaluation criteria </li></ul><ul><ul><li>Security & scalability </li></ul></ul><ul><ul><li>User adoption </li></ul></ul><ul><ul><li>Total Cost of Ownership (TCO) </li></ul></ul>Strong (two-factor) authentication
  5. 5. <ul><li>Security tokens </li></ul><ul><ul><li>Prone to man-in-the-middle attacks, extra device required, easy to lose or break, high admin costs </li></ul></ul><ul><li>Smartcards </li></ul><ul><ul><li>Extra device required (also card readers), lockout risks </li></ul></ul><ul><li>Certificates </li></ul><ul><ul><li>Easily copied, technical difficulties in installations, not portable </li></ul></ul><ul><li>Soft tokens </li></ul><ul><ul><li>High installation & support costs, device dependencies, two-factor across a single channel </li></ul></ul><ul><li>Tectia MobileID </li></ul><ul><ul><li>Fastest track to strong authentication of users </li></ul></ul><ul><ul><li>Scalable, easy-to-use, fast to deploy </li></ul></ul>Strong authentication methods
  6. 6. <ul><li>Tectia MobileID : Strong mobile phone based authentication solution </li></ul><ul><ul><ul><ul><ul><li>Multi-factor appliance designed specifically for on-demand and out-of-band authentication of remote and mobile users </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Uses mobile phones for OTP (One-Time-Password) deliveries </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Supports also traditional authentication methods such as password lists, email OTP, and OATH compliant tokens. </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>The simplest, the most scalable, and the most cost effective solution to replace tokens and password lists. </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Interoperability e.g. with web applications and virtual private network (VPN) applicances </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Global mobile network coverage with proven SLAs </li></ul></ul></ul></ul></ul>Tectia MobileID
  7. 7. <ul><li>We secure the cloud for modern, networked organizations. </li></ul>Tectia Corporation Global, established 1995, stock listed in Helsinki, holds over 30 patents
  8. 8. Your People. Your Secrets. Protected.

×