• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world Presentation Transcript

    • I“Protecting Enterprise sensitiveinformation in today’s mobile world.”Identity & Access EMEAJérôme Soufflot – Smart Cards & Devices Forum Prague - May 2013
    • Introducing Gemalto2Our company at a glanceOUR COMPANYRevenue 2012€2.2 billion+Employees10,000+Countries with a site inoperation43OUR INNOVATIONInvested in R&D 2012€177 millionPatents and patentapplications4,300OUR CUSTOMERSCountries where we havecustomers190Financial institutions3000+Dual listing on NYSE EuronextAmsterdam & ParisFrench CAC 40 index memberGTO.PAUse Gemalto products andservices2 billion Mobile operators450+eGovernment programs80Machines connect usingGemalto technology50 million
    • Our missionIntroducing Gemalto4“Gemalto develops secure software that runs on trusteddevices which we design and personalize. We manage thesedevices, the confidential data they contain and the servicesthey make possible, throughout their life cycle”.
    • Understand the risksSecurity breaches more and more frequent5Data Stolen ServiceUnavailabilityNetwork IntrusionPasswords Exposed
    • Understand the risksToo much trust on passwords6Over-reliance on password authentication is a common problemthat enables cyber criminals to penetrate networksHackers can then expand to privileged accounts such as creatingtheir own system management accounts.Deloitte predicts that in 2013 more than 90 percent of user-generated passwords, even strong, will be vulnerable to hacking
    • 7What is the weakest link in entreprise security?http://communication.gemalto.com/weakestlink/
    • What is the weakest link in entreprise security?8
    • 9What is the weakest link in entreprise security?
    • Market Drivers:Static Passwords Are Not Enough10Compliance with regulations and standards:Sarbanes-Oxley Act, Health Insurance Portability and Accountability,European Data Protection Directive, NIST Electronic AuthenticationGuideline for e-Prescription, e-health, CJIS, SICAM US MarketsSecure authentication of remote access user in order to reduceIdentity theft and phishing attacksHigh TCO for complex password policies are expensive fororganizations“Each time an end-user calls the helpdesk, it costs thorganization $25-$50.”Forrester“30 percent of allcalls to the helpdesk are forpassword resets”Gartner Group“The average end-user calls the helpdesk four times peryear for passwordsresets”Gartner Group“Businesses spend$200 per year/person onpasswordmanagement”Forrester
    • Solution Target Market and Rationale12• Enabler for migration to Multiple Factor Authentication– Seamless enforcement of high security policies based on PKI– End-to-end solution– Cost effectively deploy MFA• Global solution for Logical Access– Physical Access interoperability includes Mifare,HID..• Designed for Security Sensitive organizations“Armored Office secures access for Exec & employees thatdeal with a company’s most sensitive information” Armored office answers the challenge of security breaches and weakpasswords
    • Armored Office : Value PropositionIdAProducts• One Key to Your Kingdom No trade-off between security andusability• High Assurance Protection Microsoft-centric endpoints, networkaccess, and content privacy/integrity• Windows “Plug and Play” Ease of deployment, broad integrationwith IT ecosystem• End-to-end Solution Covers issuance, deployment andmaintenance
    • Armored Office Use CasesSecure Identity LogonSecure Remote AccessData Protection: Whole Disk, File or FoldersencryptionEmail Encryption / Digital signatureApplicationsScenariosOn-Line / Off-Line ModesLost / Stolen / Forgotten Credential
    • Example of implementations /solutionsMOBILE SECURITY15
    • Windows 8 Professional16Dell Latitude 10Enhanced SecurityWith Smart Card ReaderOr any other USBsmart card readerIDBridge K50Waterproof USB keyWith any Gemalto minidriver card
    • Gemalto Mobile SDK on Android173rd party client Application(like Secure Email, Secure Browser…)Gemalto IDGo 800 SDKUSB(on the go)NFCOtherSecureElements
    • Mobile Security NFC One Time Password18IDPrime MD based card with OTP-OATH appletApplication provided or SDKCorporateeMailCompanynetwork
    • Others platforms19IpadCouple of Gemalto Partners (Secmaker, Ergonomics , CPS…) alreadyprovide solutions & apps for Ipad based on our ID Prime.Net
    • In summary Protiva ExecProtect Suite/Armored OfficeArmored Focus: Execs and Privileged Access Users (PAU)Access to highly sensitive informationTargeted messaging to execs for access to executive IT budgetsVision and ValueThe ExecProtect suite is designed to :Protect data on all endpointsSecure access from any deviceEnable Secure & Authenticated exchange of information
    • Thanks21jerome.soufflot@gemalto.com+33155016148