I“Protecting Enterprise sensitiveinformation in today’s mobile world.”Identity & Access EMEAJérôme Soufflot – Smart Cards ...
Introducing Gemalto2Our company at a glanceOUR COMPANYRevenue 2012€2.2 billion+Employees10,000+Countries with a site inope...
Our missionIntroducing Gemalto4“Gemalto develops secure software that runs on trusteddevices which we design and personali...
Understand the risksSecurity breaches more and more frequent5Data Stolen ServiceUnavailabilityNetwork IntrusionPasswords E...
Understand the risksToo much trust on passwords6Over-reliance on password authentication is a common problemthat enables c...
7What is the weakest link in entreprise security?http://communication.gemalto.com/weakestlink/
What is the weakest link in entreprise security?8
9What is the weakest link in entreprise security?
Market Drivers:Static Passwords Are Not Enough10Compliance with regulations and standards:Sarbanes-Oxley Act, Health Insur...
Solution Target Market and Rationale12• Enabler for migration to Multiple Factor Authentication– Seamless enforcement of h...
Armored Office : Value PropositionIdAProducts• One Key to Your Kingdom No trade-off between security andusability• High A...
Armored Office Use CasesSecure Identity LogonSecure Remote AccessData Protection: Whole Disk, File or FoldersencryptionEma...
Example of implementations /solutionsMOBILE SECURITY15
Windows 8 Professional16Dell Latitude 10Enhanced SecurityWith Smart Card ReaderOr any other USBsmart card readerIDBridge K...
Gemalto Mobile SDK on Android173rd party client Application(like Secure Email, Secure Browser…)Gemalto IDGo 800 SDKUSB(on ...
Mobile Security NFC One Time Password18IDPrime MD based card with OTP-OATH appletApplication provided or SDKCorporateeMail...
Others platforms19IpadCouple of Gemalto Partners (Secmaker, Ergonomics , CPS…) alreadyprovide solutions & apps for Ipad ba...
In summary Protiva ExecProtect Suite/Armored OfficeArmored Focus: Execs and Privileged Access Users (PAU)Access to highly ...
Thanks21jerome.soufflot@gemalto.com+33155016148
Upcoming SlideShare
Loading in …5
×

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

712 views
557 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
712
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
21
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

  1. 1. I“Protecting Enterprise sensitiveinformation in today’s mobile world.”Identity & Access EMEAJérôme Soufflot – Smart Cards & Devices Forum Prague - May 2013
  2. 2. Introducing Gemalto2Our company at a glanceOUR COMPANYRevenue 2012€2.2 billion+Employees10,000+Countries with a site inoperation43OUR INNOVATIONInvested in R&D 2012€177 millionPatents and patentapplications4,300OUR CUSTOMERSCountries where we havecustomers190Financial institutions3000+Dual listing on NYSE EuronextAmsterdam & ParisFrench CAC 40 index memberGTO.PAUse Gemalto products andservices2 billion Mobile operators450+eGovernment programs80Machines connect usingGemalto technology50 million
  3. 3. Our missionIntroducing Gemalto4“Gemalto develops secure software that runs on trusteddevices which we design and personalize. We manage thesedevices, the confidential data they contain and the servicesthey make possible, throughout their life cycle”.
  4. 4. Understand the risksSecurity breaches more and more frequent5Data Stolen ServiceUnavailabilityNetwork IntrusionPasswords Exposed
  5. 5. Understand the risksToo much trust on passwords6Over-reliance on password authentication is a common problemthat enables cyber criminals to penetrate networksHackers can then expand to privileged accounts such as creatingtheir own system management accounts.Deloitte predicts that in 2013 more than 90 percent of user-generated passwords, even strong, will be vulnerable to hacking
  6. 6. 7What is the weakest link in entreprise security?http://communication.gemalto.com/weakestlink/
  7. 7. What is the weakest link in entreprise security?8
  8. 8. 9What is the weakest link in entreprise security?
  9. 9. Market Drivers:Static Passwords Are Not Enough10Compliance with regulations and standards:Sarbanes-Oxley Act, Health Insurance Portability and Accountability,European Data Protection Directive, NIST Electronic AuthenticationGuideline for e-Prescription, e-health, CJIS, SICAM US MarketsSecure authentication of remote access user in order to reduceIdentity theft and phishing attacksHigh TCO for complex password policies are expensive fororganizations“Each time an end-user calls the helpdesk, it costs thorganization $25-$50.”Forrester“30 percent of allcalls to the helpdesk are forpassword resets”Gartner Group“The average end-user calls the helpdesk four times peryear for passwordsresets”Gartner Group“Businesses spend$200 per year/person onpasswordmanagement”Forrester
  10. 10. Solution Target Market and Rationale12• Enabler for migration to Multiple Factor Authentication– Seamless enforcement of high security policies based on PKI– End-to-end solution– Cost effectively deploy MFA• Global solution for Logical Access– Physical Access interoperability includes Mifare,HID..• Designed for Security Sensitive organizations“Armored Office secures access for Exec & employees thatdeal with a company’s most sensitive information” Armored office answers the challenge of security breaches and weakpasswords
  11. 11. Armored Office : Value PropositionIdAProducts• One Key to Your Kingdom No trade-off between security andusability• High Assurance Protection Microsoft-centric endpoints, networkaccess, and content privacy/integrity• Windows “Plug and Play” Ease of deployment, broad integrationwith IT ecosystem• End-to-end Solution Covers issuance, deployment andmaintenance
  12. 12. Armored Office Use CasesSecure Identity LogonSecure Remote AccessData Protection: Whole Disk, File or FoldersencryptionEmail Encryption / Digital signatureApplicationsScenariosOn-Line / Off-Line ModesLost / Stolen / Forgotten Credential
  13. 13. Example of implementations /solutionsMOBILE SECURITY15
  14. 14. Windows 8 Professional16Dell Latitude 10Enhanced SecurityWith Smart Card ReaderOr any other USBsmart card readerIDBridge K50Waterproof USB keyWith any Gemalto minidriver card
  15. 15. Gemalto Mobile SDK on Android173rd party client Application(like Secure Email, Secure Browser…)Gemalto IDGo 800 SDKUSB(on the go)NFCOtherSecureElements
  16. 16. Mobile Security NFC One Time Password18IDPrime MD based card with OTP-OATH appletApplication provided or SDKCorporateeMailCompanynetwork
  17. 17. Others platforms19IpadCouple of Gemalto Partners (Secmaker, Ergonomics , CPS…) alreadyprovide solutions & apps for Ipad based on our ID Prime.Net
  18. 18. In summary Protiva ExecProtect Suite/Armored OfficeArmored Focus: Execs and Privileged Access Users (PAU)Access to highly sensitive informationTargeted messaging to execs for access to executive IT budgetsVision and ValueThe ExecProtect suite is designed to :Protect data on all endpointsSecure access from any deviceEnable Secure & Authenticated exchange of information
  19. 19. Thanks21jerome.soufflot@gemalto.com+33155016148

×