SlideShare a Scribd company logo
1 of 2
Download to read offline
HOTPin™: High Security, Low
Cost Two-Factor Authentication
Overview
Form grabbers, keyloggers, and phishing are a few of the tools
hackers use to steal user-login IDs. Selling stolen IDs has become
a sophisticated business, which brings up the question: who
really is on your network? Authenticating users is the security
issue to tackle today.
Two-Factor Authentication (2FA) systems screen users by
asking them for something the user knows (like a password or
PIN) and something the user has (such as a hardware token or
card). HOTPin™ is Celestix’ new 2FA system. Celestix designed
HOTPin from the ground up to deliver highly secure 2FA with
one-time passwords (OTPs) — delivered to users’ mobile phones
and PCs to slash costs. HOTPin is the first 2FA system fully
integrated with Microsoft IAG 2007 SSL VPN software. Deployed
on WSA™, the world’s best selling IAG appliance brand, HOTPin
is the 2FA solution for IAG.
HOTPin™ drives out cost
Usually 2FA systems have very high per-user costs. Traditional
hardware tokens used in legacy 2FA systems can cost $150 per
user. In contrast, Celestix HOTPin™ systems put OTPs on users’
mobile phones to eliminate the entire cost of expensive single-
function hardware tokens.
HOTPin’s server-side application deploys as a plugin on Celestix
WSA™ series appliances. WSA appliances use IAG software to
provide remote users with secure connectivity to networks by
creating SSL VPNs. The HOTPin server plugin manages user
credentials and authenticates users. HOTPin uses HOTP, which
is an HMAC-based algorithm for generating OTPs. Unlike the
algorithms used by many legacy vendors, HOTP is an open
standard that has received extensive scrutiny from security-
industry experts and leading academics.
Benefits
•	 Great for extranet partners, bank customers, medical
patients, and other transient users since there is no
need to redistribute hardware tokens after short-term
use. You can repurpose user licensing on the fly.
•	 Open-standard HOTP provides a higher level of trust.
•	 Low cost: avoid expensive hardware tokens and enjoy
lower costs on server software.
•	 Convenience: easier to use and manage without extra
hardware tokens.
•	 Stronger compliance with PCI, SOX, HIPPA and other
regulations.
•	 Enable employee mobility.
•	 State of the art technology keeps you on the leading
edge of 2FA.
•	 Highly interoperable with Microsoft infrastructures for
reliable operations.
•	 On-box integration with IAG 2007 SSL VPN for fast
installation and easy management.
•	 Total solution: Celestix is your single-point supplier for
hardware, software, professional services, and support.
•	 Lower environmental impact: no expired hardware
tokens to send to landfills
2FA for Celestix WSA SSL VPN Appliance
8320756
Pantone Warm Red CVC
Pantone 7544440 Mission Court. Suite 231
Fremont, California 94539
www.celestix.com
©2009 Celestix Networks Inc. All Rights Reserved. Celestix and Celestix logo are trademarks of Celestix Networks, Inc. Microsoft, Active Directory, Windows, Windows NT and Windows logo are either trademarks
registered trademarks of Microsoft Corporation in the United states and/or other countries. All other products and company names mentioned are trademarks or registered trademarks of their respective owners.
Part number: DS-HOTUK-01
Americas	 +1 510 668.0700
Singapore 	 +65 6781.0700
For more information about HOTPin, contact Celestix today at:
United Kingdom 	 +44 (0) 118 959 6198
India 	 +91 44 3910 3530
Active
Directory
Celestix WSA Appliance Exchange
Server
SharePoint
Server
LDAP IBM/Lotus Oracle
Third-party
MS apps
PC Email
Clientless
External
Firewall
PC Soft Client
Smartphones with
soft client
SMS Clientless
Internet
*
SMS
Gateway
Wireless network
HOTPin Server (Installed on WSA)
HOTPin puts OTPs on mobile phones two ways: clientless mode and client mode. In clientless mode, the HOTPin server applica-
tion generates OTPs and sends them via SMS text messages to users’ mobile phones or PCs. Clientless mode is perfect for users
who don’t have smart phones. For client mode, users download HOTPin client software to their smart phones or PCs. HOTPin client
software generates OTPs directly on the smart phone or PC. The advantage of client mode is that it delivers OTPs regardless of wire-
less reception. HOTPin also has a Windows client you can install on PCs to deliver OTPs directly to the desktop. Here are the clients
HOTPin currently supports in client mode:
Celestix North Star™ Professional Services
Celestix can provide engineering services to help you customize HOTPin and IAG solutions to your specific deployment challenges.
For more information visit: www.celestix.com/products/hotpin.html or contact sales@celestix.com.
HOTPin Client for RIM
BlackBerry
HOTPin Client for
Windows Mobile 5/6, Pocket
PCs
HOTPin Client for
Standard Win32 Software Devices
HOTPin Client for
Apple iPhone

More Related Content

What's hot

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5digiflak
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportTariq Tauheed
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesFIDO Alliance
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windowsarpit06055
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationZeev Shetach
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11EMMAIntl
 

What's hot (20)

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
 
qx1000_ds_a4
qx1000_ds_a4qx1000_ds_a4
qx1000_ds_a4
 
My ppt
My pptMy ppt
My ppt
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.
 
Fx7400
Fx7400Fx7400
Fx7400
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11
 

Viewers also liked

Estante Virtual: operação e gestão de um marketplace
Estante Virtual: operação e gestão de um marketplaceEstante Virtual: operação e gestão de um marketplace
Estante Virtual: operação e gestão de um marketplaceE-Commerce Brasil
 
«Introduction to malware reverse engineering» by Sergey Kharyuk
«Introduction to malware reverse engineering» by Sergey Kharyuk«Introduction to malware reverse engineering» by Sergey Kharyuk
«Introduction to malware reverse engineering» by Sergey Kharyuk0xdec0de
 
List Film Film Mashhad
List Film Film MashhadList Film Film Mashhad
List Film Film Mashhadgueste7d2d2
 
List Film 7 Oghab
List Film 7 OghabList Film 7 Oghab
List Film 7 Oghabgueste7d2d2
 
Latest project background 1
Latest project background 1Latest project background 1
Latest project background 1JamesMoy7
 
La paradoja Autora: Stephany Catro
La paradoja Autora: Stephany Catro La paradoja Autora: Stephany Catro
La paradoja Autora: Stephany Catro ANY2101
 
Железо и здоровье человека
Железо и здоровье человекаЖелезо и здоровье человека
Железо и здоровье человекаLjudmilla Nikolajenko
 
Rock in rio
Rock in rioRock in rio
Rock in rioKaryn XP
 
Team pizzasola sectionB_part2
Team pizzasola sectionB_part2Team pizzasola sectionB_part2
Team pizzasola sectionB_part2Gayeon Bae
 
PresentacióN Plan B
PresentacióN Plan BPresentacióN Plan B
PresentacióN Plan Binmamart
 
Marketing presentation_FINAL
Marketing presentation_FINALMarketing presentation_FINAL
Marketing presentation_FINALGayeon Bae
 
I ja j-i õigekiri
I ja j-i õigekiriI ja j-i õigekiri
I ja j-i õigekiririinaoun
 
Precisa se de homens bonitos 7 nov
Precisa se de homens bonitos 7 novPrecisa se de homens bonitos 7 nov
Precisa se de homens bonitos 7 novSelma Felerico
 

Viewers also liked (20)

Estante Virtual: operação e gestão de um marketplace
Estante Virtual: operação e gestão de um marketplaceEstante Virtual: operação e gestão de um marketplace
Estante Virtual: operação e gestão de um marketplace
 
Themost
ThemostThemost
Themost
 
Why mobile?
Why mobile?Why mobile?
Why mobile?
 
«Introduction to malware reverse engineering» by Sergey Kharyuk
«Introduction to malware reverse engineering» by Sergey Kharyuk«Introduction to malware reverse engineering» by Sergey Kharyuk
«Introduction to malware reverse engineering» by Sergey Kharyuk
 
List Film Film Mashhad
List Film Film MashhadList Film Film Mashhad
List Film Film Mashhad
 
Themost
ThemostThemost
Themost
 
Kontrak belajar
Kontrak belajarKontrak belajar
Kontrak belajar
 
List Film 7 Oghab
List Film 7 OghabList Film 7 Oghab
List Film 7 Oghab
 
Latest project background 1
Latest project background 1Latest project background 1
Latest project background 1
 
Reglamento
ReglamentoReglamento
Reglamento
 
La paradoja Autora: Stephany Catro
La paradoja Autora: Stephany Catro La paradoja Autora: Stephany Catro
La paradoja Autora: Stephany Catro
 
Железо и здоровье человека
Железо и здоровье человекаЖелезо и здоровье человека
Железо и здоровье человека
 
Kk konspektas
Kk konspektasKk konspektas
Kk konspektas
 
Rock in rio
Rock in rioRock in rio
Rock in rio
 
Team pizzasola sectionB_part2
Team pizzasola sectionB_part2Team pizzasola sectionB_part2
Team pizzasola sectionB_part2
 
PresentacióN Plan B
PresentacióN Plan BPresentacióN Plan B
PresentacióN Plan B
 
Marketing presentation_FINAL
Marketing presentation_FINALMarketing presentation_FINAL
Marketing presentation_FINAL
 
El-futhark-antiguo
El-futhark-antiguoEl-futhark-antiguo
El-futhark-antiguo
 
I ja j-i õigekiri
I ja j-i õigekiriI ja j-i õigekiri
I ja j-i õigekiri
 
Precisa se de homens bonitos 7 nov
Precisa se de homens bonitos 7 novPrecisa se de homens bonitos 7 nov
Precisa se de homens bonitos 7 nov
 

Similar to Hotpin datasheet

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company PresentationVladimir PAVLENKO
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustZeev Shetach
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
No plagiarized work. I need 8 to 9 page paper analyzing the.docx
No plagiarized work.  I need 8 to 9 page paper analyzing the.docxNo plagiarized work.  I need 8 to 9 page paper analyzing the.docx
No plagiarized work. I need 8 to 9 page paper analyzing the.docxhenrymartin15260
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 

Similar to Hotpin datasheet (20)

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company Presentation
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015
 
No plagiarized work. I need 8 to 9 page paper analyzing the.docx
No plagiarized work.  I need 8 to 9 page paper analyzing the.docxNo plagiarized work.  I need 8 to 9 page paper analyzing the.docx
No plagiarized work. I need 8 to 9 page paper analyzing the.docx
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 

More from Hai Nguyen

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 

More from Hai Nguyen (20)

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 

Hotpin datasheet

  • 1. HOTPin™: High Security, Low Cost Two-Factor Authentication Overview Form grabbers, keyloggers, and phishing are a few of the tools hackers use to steal user-login IDs. Selling stolen IDs has become a sophisticated business, which brings up the question: who really is on your network? Authenticating users is the security issue to tackle today. Two-Factor Authentication (2FA) systems screen users by asking them for something the user knows (like a password or PIN) and something the user has (such as a hardware token or card). HOTPin™ is Celestix’ new 2FA system. Celestix designed HOTPin from the ground up to deliver highly secure 2FA with one-time passwords (OTPs) — delivered to users’ mobile phones and PCs to slash costs. HOTPin is the first 2FA system fully integrated with Microsoft IAG 2007 SSL VPN software. Deployed on WSA™, the world’s best selling IAG appliance brand, HOTPin is the 2FA solution for IAG. HOTPin™ drives out cost Usually 2FA systems have very high per-user costs. Traditional hardware tokens used in legacy 2FA systems can cost $150 per user. In contrast, Celestix HOTPin™ systems put OTPs on users’ mobile phones to eliminate the entire cost of expensive single- function hardware tokens. HOTPin’s server-side application deploys as a plugin on Celestix WSA™ series appliances. WSA appliances use IAG software to provide remote users with secure connectivity to networks by creating SSL VPNs. The HOTPin server plugin manages user credentials and authenticates users. HOTPin uses HOTP, which is an HMAC-based algorithm for generating OTPs. Unlike the algorithms used by many legacy vendors, HOTP is an open standard that has received extensive scrutiny from security- industry experts and leading academics. Benefits • Great for extranet partners, bank customers, medical patients, and other transient users since there is no need to redistribute hardware tokens after short-term use. You can repurpose user licensing on the fly. • Open-standard HOTP provides a higher level of trust. • Low cost: avoid expensive hardware tokens and enjoy lower costs on server software. • Convenience: easier to use and manage without extra hardware tokens. • Stronger compliance with PCI, SOX, HIPPA and other regulations. • Enable employee mobility. • State of the art technology keeps you on the leading edge of 2FA. • Highly interoperable with Microsoft infrastructures for reliable operations. • On-box integration with IAG 2007 SSL VPN for fast installation and easy management. • Total solution: Celestix is your single-point supplier for hardware, software, professional services, and support. • Lower environmental impact: no expired hardware tokens to send to landfills 2FA for Celestix WSA SSL VPN Appliance 8320756
  • 2. Pantone Warm Red CVC Pantone 7544440 Mission Court. Suite 231 Fremont, California 94539 www.celestix.com ©2009 Celestix Networks Inc. All Rights Reserved. Celestix and Celestix logo are trademarks of Celestix Networks, Inc. Microsoft, Active Directory, Windows, Windows NT and Windows logo are either trademarks registered trademarks of Microsoft Corporation in the United states and/or other countries. All other products and company names mentioned are trademarks or registered trademarks of their respective owners. Part number: DS-HOTUK-01 Americas +1 510 668.0700 Singapore +65 6781.0700 For more information about HOTPin, contact Celestix today at: United Kingdom +44 (0) 118 959 6198 India +91 44 3910 3530 Active Directory Celestix WSA Appliance Exchange Server SharePoint Server LDAP IBM/Lotus Oracle Third-party MS apps PC Email Clientless External Firewall PC Soft Client Smartphones with soft client SMS Clientless Internet * SMS Gateway Wireless network HOTPin Server (Installed on WSA) HOTPin puts OTPs on mobile phones two ways: clientless mode and client mode. In clientless mode, the HOTPin server applica- tion generates OTPs and sends them via SMS text messages to users’ mobile phones or PCs. Clientless mode is perfect for users who don’t have smart phones. For client mode, users download HOTPin client software to their smart phones or PCs. HOTPin client software generates OTPs directly on the smart phone or PC. The advantage of client mode is that it delivers OTPs regardless of wire- less reception. HOTPin also has a Windows client you can install on PCs to deliver OTPs directly to the desktop. Here are the clients HOTPin currently supports in client mode: Celestix North Star™ Professional Services Celestix can provide engineering services to help you customize HOTPin and IAG solutions to your specific deployment challenges. For more information visit: www.celestix.com/products/hotpin.html or contact sales@celestix.com. HOTPin Client for RIM BlackBerry HOTPin Client for Windows Mobile 5/6, Pocket PCs HOTPin Client for Standard Win32 Software Devices HOTPin Client for Apple iPhone