EasySecured™ Easily secure your online identity and information
Overview <ul><li>Provide security for high-value transactions and secure access to important information, to increase prod...
Introduction – Online Security <ul><li>Number of online users personal and business is increasing </li></ul><ul><li>Data i...
Problem with Passwords <ul><li>Passwords are not User Friendly  - Passwords are difficult to define and even more difficul...
Why Stronger Authentication? <ul><li>Organization can offer services that are otherwise risky or impractical </li></ul><ul...
Strong Authentication Criteria <ul><li>Something you know  – something the user needs to remember, such as a password, a P...
Current Solutions / Issues <ul><li>USB Tokens  – User software installation required </li></ul><ul><li>Smart Cards  – Low ...
New Solution Requirement <ul><li>Usability  – easy to learn and user friendly </li></ul><ul><li>Openness  – Can offer exte...
EasySecured <ul><li>Password Less  – User does not require to define or remember passwords, password not stored on server ...
Products <ul><li>EasySecured Encoded JavaScript  – Easy to incorporate encrypted JavaScript function that is locked for a ...
Partnerships <ul><li>EasySecured Reseller  – Non-Exclusive reseller of EasySecured Products in specific region. 25% Margin...
Thank You Contact Mr. Gurudatt Shenoy Tel: +91 9930687411 / 9821140603 www.easysecured.com www.0pass.com
Upcoming SlideShare
Loading in …5
×

Easy Secured Presentation1

371
-1

Published on

This presentation highlights the online identity and access management solutions and the solution offered by EasySecured

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
371
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Easy Secured Presentation1

  1. 1. EasySecured™ Easily secure your online identity and information
  2. 2. Overview <ul><li>Provide security for high-value transactions and secure access to important information, to increase productivity and business. </li></ul><ul><li>Ensure compliance with security regulations </li></ul><ul><li>Defend against attackers who exploit weak authentication for identity theft and fraudulent transactions. </li></ul><ul><li>Reduce costs derived from poor password management. </li></ul><ul><li>Attract increasing number of security-conscious consumers. </li></ul><ul><li>Integrate with end user as well as organizations existing infrastructure resulting in higher ROI. </li></ul>
  3. 3. Introduction – Online Security <ul><li>Number of online users personal and business is increasing </li></ul><ul><li>Data is moving to the cloud with information security being taken more seriously </li></ul><ul><li>Number of Financial services being offered on the online platform is increasing </li></ul><ul><li>Increase in identity theft and corporate fraud cases </li></ul><ul><li>Online Security is vital for enabling business, cutting costs, complying with regulations, establishing a productive work environment, and attracting customers </li></ul><ul><li>Cost consciousness is driving companies to solutions offering maximum ROI </li></ul>
  4. 4. Problem with Passwords <ul><li>Passwords are not User Friendly - Passwords are difficult to define and even more difficult to remember </li></ul><ul><li>Passwords are expensive – Every forgotten or lost password results in significant costs both to user and organization in terms of lost productivity </li></ul><ul><li>Passwords are not secure – To handle their multiple credentials, many users choose easy-to-guess passwords </li></ul><ul><li>Passwords not manageable – Cross domain access not advisable using same password credentials </li></ul>
  5. 5. Why Stronger Authentication? <ul><li>Organization can offer services that are otherwise risky or impractical </li></ul><ul><li>Security rules and regulations hold organizations responsible for business data integrity and protection of personal information entrusted to them </li></ul><ul><li>Strong authentication enables users to spend more time engaging in value-added activities </li></ul><ul><li>Strong authentication saves costs by enabling more efficient business, significantly reducing password administration expenses, and preventing costly security breaches </li></ul><ul><li>Strong authentication helps organizations to attract security- conscious customers </li></ul>
  6. 6. Strong Authentication Criteria <ul><li>Something you know – something the user needs to remember, such as a password, a PIN, or an answer to a personal question </li></ul><ul><li>Something you have – something the user needs to physically carry, such as a USB Device </li></ul><ul><li>Something you are – a biometric feature, such as a fingerprint or facial characteristic </li></ul><ul><li>How you are identified – Comparing what you entered to your credentials stored on a server. </li></ul>
  7. 7. Current Solutions / Issues <ul><li>USB Tokens – User software installation required </li></ul><ul><li>Smart Cards – Low Mobility Card reader required </li></ul><ul><li>Smart-card-based USB Tokens – User software installation required </li></ul><ul><li>One-time Password (OTP) Tokens – Authentication server required, Limited Lifetime, Limited Solutions </li></ul><ul><li>Hybrid Tokens – Authentication server required, Limited Lifetime, Limited Solutions </li></ul><ul><li>Software Tokens - Token Key is not secured, Limited solutions supported, Authentication server required </li></ul>
  8. 8. New Solution Requirement <ul><li>Usability – easy to learn and user friendly </li></ul><ul><li>Openness – Can offer extending solution support </li></ul><ul><li>Flexibility – modify the solution based on its existing and evolving needs </li></ul><ul><li>Manageability – For Enterprise wide Deployment </li></ul><ul><li>Cost – Setup, recurring fees, replacement costs, and the costs involved in extending the solution </li></ul><ul><li>Application – Internal or External, Multiple applications, Data Encryption, Device Security </li></ul>
  9. 9. EasySecured <ul><li>Password Less – User does not require to define or remember passwords, password not stored on server </li></ul><ul><li>Device Locked – Can lock information or application to a general use computing device such as Client PC, USB Mouse or Pen Drive </li></ul><ul><li>Easy Deployment – Customizable JavaScript that returns unique Machine and User Identity for domain </li></ul><ul><li>Easy Manageability – Device, Application and User Identity </li></ul><ul><li>Software Requirements – Windows OS, Internet Explorer with JavaScript/ActiveX enabled </li></ul><ul><li>Low TCO High ROI – Usage based/Fixed License Fee, Supports existing infrastructure, integrate with existing application </li></ul>
  10. 10. Products <ul><li>EasySecured Encoded JavaScript – Easy to incorporate encrypted JavaScript function that is locked for a domain for unlimited users. Returns unique password for PC, USB Mouse, USB Pen Drive </li></ul><ul><li>EasySecured Custom JavaScript – Similar to above with function customized to customer specification regarding multiple domain, device types, encryption methods </li></ul><ul><li>EasySecured IMS – Customized complete end-to-end user authentication and identity management solution </li></ul>
  11. 11. Partnerships <ul><li>EasySecured Reseller – Non-Exclusive reseller of EasySecured Products in specific region. 25% Margin </li></ul><ul><li>EasySecured Channel Partner – Exclusive partner for specific region; marketing and selling EasySecured Products, appointing resellers in region. 40% Margin </li></ul><ul><li>EasySecured Business Partner – Business Development and Marketing of EasySecured Products worldwide, appointing Channel Partners for regions and provide direct customer support. 60% Margin </li></ul>
  12. 12. Thank You Contact Mr. Gurudatt Shenoy Tel: +91 9930687411 / 9821140603 www.easysecured.com www.0pass.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×