Strong authentication for the emerging markets. jouni h. leinonen, tectia corporation.

  • 950 views
Uploaded on

Seminar on Information and Network Security for Emerging Markets. Presentation material 20-21.9.2011.

Seminar on Information and Network Security for Emerging Markets. Presentation material 20-21.9.2011.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
950
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Strong Authentication for the Emerging Markets Challenges of and solutions for strong authentication
    • Dr. Jouni H. Leinonen, EVP & COO
    • September 21, 2011
  • 2. How to authenticate remote users?
            • Authentication is generally required for remote users and various external stakeholders
            • Several applications and use cases
            • Dynamic environment and user base with various needs and requirements
            • How to detect fraud access
    Key challenges in authentication Remote workers Business partners Ad-hoc remote accounts End users, consumers Trading partners Outsourced employees Suppliers, vendors External services Common drivers for authentication
  • 3. National cyber security policies, outsourcing, internet penetration, ICT investments, E-governance and E-commerce initiatives, hacking threats etc. are driving the need for strong authentication of the users also in South Africa, United Arab Emirates and India. Growing need for strong authentication
  • 4.
    • What does strong authentication mean?
      • Authentication is based on two of the following factors:
      • Something you know e.g. a password or PIN
      • Something you have e.g. token or mobile phone
      • Something you are e.g. finger print
    • Evaluation criteria
      • Security & scalability
      • User adoption
      • Total Cost of Ownership (TCO)
    Strong (two-factor) authentication
  • 5.
    • Security tokens
      • Prone to man-in-the-middle attacks, extra device required, easy to lose or break, high admin costs
    • Smartcards
      • Extra device required (also card readers), lockout risks
    • Certificates
      • Easily copied, technical difficulties in installations, not portable
    • Soft tokens
      • High installation & support costs, device dependencies, two-factor across a single channel
    • Tectia MobileID
      • Fastest track to strong authentication of users
      • Scalable, easy-to-use, fast to deploy
    Strong authentication methods
  • 6.
    • Tectia MobileID : Strong mobile phone based authentication solution
            • Multi-factor appliance designed specifically for on-demand and out-of-band authentication of remote and mobile users
            • Uses mobile phones for OTP (One-Time-Password) deliveries
            • Supports also traditional authentication methods such as password lists, email OTP, and OATH compliant tokens.
            • The simplest, the most scalable, and the most cost effective solution to replace tokens and password lists.
            • Interoperability e.g. with web applications and virtual private network (VPN) applicances
            • Global mobile network coverage with proven SLAs
    Tectia MobileID
  • 7.
    • We secure the cloud for modern, networked organizations.
    Tectia Corporation Global, established 1995, stock listed in Helsinki, holds over 30 patents
  • 8. Your People. Your Secrets. Protected.