Submit Search
Upload
Apr 28-2015 vasco investor presentation
•
Download as PPTX, PDF
•
0 likes
•
1,518 views
VASCO Data Security
Follow
Q1 2015 VASCO Data Security International Earnings Conference Call
Read less
Read more
Investor Relations
Report
Share
Report
Share
1 of 30
Download now
Recommended
Feb 18-2015 vasco investor presentation
Feb 18-2015 vasco investor presentation
VASCO Data Security
Vasco Investor Presentation
Vasco Investor Presentation
VASCO Data Security
VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015
VASCO Data Security
January 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
rodrida1
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
VASCO Data Security
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
Aanchal579958
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
Investorideas.com
G06.2014 magic quadrant for secure web gateways
G06.2014 magic quadrant for secure web gateways
Satya Harish
Recommended
Feb 18-2015 vasco investor presentation
Feb 18-2015 vasco investor presentation
VASCO Data Security
Vasco Investor Presentation
Vasco Investor Presentation
VASCO Data Security
VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015
VASCO Data Security
January 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
rodrida1
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
VASCO Data Security
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
Aanchal579958
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
Investorideas.com
G06.2014 magic quadrant for secure web gateways
G06.2014 magic quadrant for secure web gateways
Satya Harish
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
DevOps.com
The smartdefend Story Book
The smartdefend Story Book
Smart Defend UK
The Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
NetMotion Wireless
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
Wultra
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
CSA Argentina
Csa summit seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
White paper surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
2010 magic quadrant utm final 2
2010 magic quadrant utm final 2
Yustinus Malawau
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
Javier Gonzalez
Managing Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
Dharmesh Thakker
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
Javier Gonzalez
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
October 2015 Vasco investor presention
October 2015 Vasco investor presention
rodrida1
September 2015 vasco investor presention final
September 2015 vasco investor presention final
rodrida1
More Related Content
What's hot
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
DevOps.com
The smartdefend Story Book
The smartdefend Story Book
Smart Defend UK
The Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
NetMotion Wireless
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
Wultra
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
CSA Argentina
Csa summit seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
White paper surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
2010 magic quadrant utm final 2
2010 magic quadrant utm final 2
Yustinus Malawau
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
Javier Gonzalez
Managing Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
Dharmesh Thakker
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
Javier Gonzalez
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
What's hot
(20)
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
The smartdefend Story Book
The smartdefend Story Book
The Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit seguridad en el sddc
Csa summit seguridad en el sddc
White paper surveillancepointmarket
White paper surveillancepointmarket
2010 magic quadrant utm final 2
2010 magic quadrant utm final 2
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
Managing Identity without Boundaries
Managing Identity without Boundaries
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Similar to Apr 28-2015 vasco investor presentation
October 2015 Vasco investor presention
October 2015 Vasco investor presention
rodrida1
September 2015 vasco investor presention final
September 2015 vasco investor presention final
rodrida1
Secure your Business
Secure your Business
VASCO Data Security
Identikey
Identikey
VASCO Data Security
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009
oliverm1
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
CA Technologies
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
RedChip Companies, Inc.
Iveda Investor Presentation
Iveda Investor Presentation
ivedasolutions
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
CA Technologies
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
RAVI PRAKASH
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
RaviNeppalli
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
Ubisecure
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
Cyber Priority - Judson Walker
Cyber Priority - Judson Walker
scoopnewsgroup
Iveda Investor Presentation
Iveda Investor Presentation
ivedasolutions
Iveda Investor Presentation
Iveda Investor Presentation
ivedasolutions
Iveda General Investor Presentation
Iveda General Investor Presentation
ivedasolutions
Similar to Apr 28-2015 vasco investor presentation
(20)
October 2015 Vasco investor presention
October 2015 Vasco investor presention
September 2015 vasco investor presention final
September 2015 vasco investor presention final
Secure your Business
Secure your Business
Identikey
Identikey
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda Investor Presentation
Iveda Investor Presentation
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Cyber Priority - Judson Walker
Cyber Priority - Judson Walker
Iveda Investor Presentation
Iveda Investor Presentation
Iveda Investor Presentation
Iveda Investor Presentation
Iveda General Investor Presentation
Iveda General Investor Presentation
Recently uploaded
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
Transique Corporate Advisors
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
CAMILRI
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
sovco
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
Demetrius Brasil Faria da Silva
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
meghakumariji156
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
Probe Gold
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Klinik kandungan
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
Terna SpA
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
meghakumariji156
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
Leonardo
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
gstubel
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
xzxvi5zp
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
kojalkojal131
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
Philip Rabenok
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
CAMILRI
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
Kweku Zurek
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
KDDI
Recently uploaded
(20)
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
Apr 28-2015 vasco investor presentation
1.
© 2014 -
VASCO Data Security `
2.
© 2014 -
VASCO Data Security CONFIDENTIAL Forward Looking Statements Statements made in this presentation that relate to future plans, events or performances are forward- looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”, “could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar words and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward-looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward-looking statements. These risks, uncertainties and other factors that have been described in our Annual Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a) risks of general market conditions, including currency fluctuations and the uncertainties resulting from turmoil in world economic and financial markets, (b) risks inherent to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated hacking attempts, increasing numbers of patent infringement claims, changes in customer requirements, price competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products and services, competition from more established firms and others, pressures on price levels and our historical dependence on relatively few products, certain suppliers and certain key customers. Thus, the results that we actually achieve may differ materially from any anticipated results included in, or implied by these statements. Except for our ongoing obligations to disclose material information as required by the U.S. federal securities laws, we do not have any obligations or intention to release publicly any revisions to any forward-looking statements to reflect events or circumstances in the future or to reflect the occurrence of unanticipated events. 2
3.
© 2014 -
VASCO Data Security CONFIDENTIAL Company Overview VASCO is a global leader in strong authentication, digital signatures, and identity management solutions specializing in securing financial transactions and protecting access to data and applications. 3
4.
© 2014 -
VASCO Data Security CONFIDENTIAL Listed on NASDAQ in 1997 21% Compound Annual Growth Rate in Revenues from 2004-2014 49 Consecutive Quarters of Profitability Company Overview 4
5.
© 2014 -
VASCO Data Security CONFIDENTIAL 10,000+ Customers in more than 100 Countries, More than half of the Top 100 Global Banks and 1,700+ Financial Institutions rely on VASCO More than 200 Million Authenticators Sold Company Overview 5
6.
© 2014 -
VASCO Data Security CONFIDENTIAL Global Company VASCO HQ VASCO Offices VASCO Sales Presence 6
7.
© 2014 -
VASCO Data Security CONFIDENTIAL Financial Institution Customers VASCO is the world leader in providing two-factor authentication and digital signature solutions to financial institutions. More than half of the Top 100 Global Banks rely on VASCO solutions. 7
8.
© 2014 -
VASCO Data Security CONFIDENTIAL Frequency and sophistication of attacks has increased High-profile breaches have brought security to the C-level and Board of Directors Global Regulations to protect consumer transactions and personal privacy Mobile is becoming the device of choice There is a greater need to enhance security while improving convenience for users Key Growth Drivers 8
9.
© 2014 -
VASCO Data Security CONFIDENTIAL "Two out of three attacks focus on [login] credentials at some point in the attack. Trying to get valid credentials is part of many styles of attacks and patterns" - Jay Jacobs, senior analyst with Verizon Authentication & Digital Signature Platform Why Authentication • Data breaches are up 49%(1) • Protects against the newest attacks • Easy to implement and use (1) The Breach Level Index, released February, 2015. 9
10.
© 2014 -
VASCO Data Security CONFIDENTIAL Technology and Products 1988 1st DIGIPASS “Access Key” 1989 1st DIGIPASS with Keypad 2002 VACMAN Controller 2004 DIGIPASS GO 3 1st 1-button token 2005 IDENTIKEY SERVER 2005 DIGIPASS 810 EMV card reader 2006 DIGIPASS 905 1st connected Card reader 2007 DIGIPASS 270 1st thin form Token w/keypad 2008 DP for Mobile Soft token for phones VASCO Solution Timeline 1991 DIGIPASS 550 with e-Signature 10
11.
© 2014 -
VASCO Data Security CONFIDENTIAL 2014 Rabo Scanner Card reader with CrontoSIgn technology 2014 DIGIPASS for Apps with CrontoSIgn technology Technology and Products 2013 DIGIPASS for Apps SDK for integration into applications VASCO Solution Timeline 2011 DIGIPASS 920 Connected reader for e-Government 2013 DIGIPASS 870 1st dual mode e-Gov’t reader 2015 Risk IDS 1st RBA with Intelligent engine 2013 DIGIPASS 760 1st token with Cronto technology 11 2014 DIGIPASS Bluetooth Smart-enabled Authenticators
12.
© 2014 -
VASCO Data Security CONFIDENTIAL Host System • VACMAN Controller: Combines all VASCO authentication technologies into a unified backend platform. • IDENTIKEY Authentication & Federation Servers: Off- the-shelf centralized servers that with complete functionality. • Cloud Services: Authentication and digital signature services for web and mobile application developers run on VASCO’s servers. Client Authenticators • DIGIPASS: Industry-leading number of hardware and software authentication and signature (electronic and digital) solutions available to customers. • Embedded & OEM Solutions: DIGIPASS integrated into client devices such as Intel’s Identity Protection Technology. VASCO’s Product Offerings 12
13.
© 2014 -
VASCO Data Security CONFIDENTIAL On-Premise Business Model Banking: • Corporate Accounts • Consumer Accounts • Internet and Mobile Applications Enterprise Security: • Remote access • Application Security for B-to-B and B-to-C • Employee network access 13
14.
© 2014 -
VASCO Data Security CONFIDENTIAL Cloud-Based Business Model A cloud-based expansion of VASCO’s traditional on-premise solution. “By 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementations, up from less than 10% today.” - Gartner Cloud advantages: • Easy to implement • Unlimited scalability • Low implementation cost • Operating vs. Capital expense • Rapid deployment 14
15.
© 2014 -
VASCO Data Security CONFIDENTIAL • Strong Authentication in the cloud • Allows customers to reduce implementation time and cost • Provides strong authentication protection without requiring a high level of expertise on staff • Host system software maintained on VASCO servers: • Business-to-Business (B2B) • Business-to-Employee (B2E) • Business-to-Consumer (B2C) • Recurring revenue paid by the customer DIGIPASS as a Service DIGIPASS as a Service 15
16.
© 2014 -
VASCO Data Security CONFIDENTIAL Key Product Initiatives DIGIPASS 760 New Attack Methods Require Innovative Solutions 16 DIGIPASS for Apps DIGIPASS Bluetooth Risk-Based Authentication
17.
© 2014 -
VASCO Data Security CONFIDENTIAL • Developed by Cambridge University PhD’s • Acquired by VASCO in May 2013 • Next generation HD Color QR Code with expanded data capacity • Combines authentication and signature capabilities with a high level of user convenience • Defeats Man-in-the-Middle attacks • Fully supported by VACMAN and IDENTIKEY • Works from a mobile device or DIGIPASS 760 Cronto Visual Image Authentication DIGIPASS 760 17
18.
© 2014 -
VASCO Data Security CONFIDENTIAL Cronto Visual Image Authentication How it Works – Scan to Sign 18
19.
© 2014 -
VASCO Data Security CONFIDENTIAL • Incorporates security directly into the application DIGIPASS for APPS DIGIPASS for APPS • Native integration of two-factor authentication • Developers focus on their application and outsource the security to VASCO Source: Gartner Global App Downloads Passed 100 Billion Last Year Estimated mobile app downloads worldwide (in billions) 19
20.
© 2014 -
VASCO Data Security CONFIDENTIAL DIGIPASS for APPS A Library of Advanced Security Applications 20 All of the necessary building blocks to secure applications at every level, from provisioning to the human interface.
21.
© 2014 -
VASCO Data Security CONFIDENTIAL 21 Geolocation OS Version JailBreak & Root Detection Malware PIN Activated Behavior Analysis Biometric ClientScorePolicy ScoreCalculation OTPInjection ClientSideDecisionPolicy Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … 1 2 3 4 Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … ServerScorePolicy OTPExtraction OTPValidation 5 6 ContextPlatformUser DIGIPASS for APPS Intelligent Risk Scoring for Mobile Devices
22.
© 2014 -
VASCO Data Security CONFIDENTIAL • Eliminates the biggest hurdles to cloud adoption • Boosts customer trust • Security as a competitive differentiator • Ease of implementation • Provides a pay-as-you-grow approach • Next step in DIGIPASS as a Service Cloud-based Security for Application Developers DIGIPASS for APPS 22
23.
© 2014 -
VASCO Data Security CONFIDENTIAL Bluetooth Smart-enabled 23 Bluetooth Smart Enables Authentication with almost any User Device • Solves the problem of mobile devices with no USB port • More convenient with no cables to connect • Secure Bluetooth Smart-enabled connection • Works in connected and unconnected mode
24.
© 2014 -
VASCO Data Security CONFIDENTIAL Risk-Based Authentication How it works: Risk IDS Source: Gartner 24
25.
© 2014 -
VASCO Data Security CONFIDENTIAL • Contextual analysis to apply the appropriate level of security • Real-time analysis and intelligent decision engine focusing on: • Web and mobile application login • Financial transactions via online and mobile channels • Monitoring non-monetary events such as change of address • Identification of accounts that demonstrate abnormal characteristics for the prevention of money laundering. Risk IDS Risk-Based Authentication 25
26.
© 2014 -
VASCO Data Security CONFIDENTIAL Financials Historical Overview 26
27.
© 2014 -
VASCO Data Security CONFIDENTIAL Revenue and Operating Income Revenue Operating Income in millions USD in millions USD CAGR (revenue) 2004-2014 21% 27
28.
© 2014 -
VASCO Data Security CONFIDENTIAL Cash Balance and Net Working Capital Net Cash Balance Net working capital in millions USDin millions USD 28
29.
© 2014 -
VASCO Data Security
30.
© 2014 -
VASCO Data Security Copyright 2014 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® Cronto® MYDIGIPASS.COM® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries Copyright & Trademarks 30
Download now