SlideShare a Scribd company logo
1 of 34
Download to read offline
© 2017 Veridium IP Ltd. All rights reserved
Eliminating Passwords with
Biometrics for Identity Access
Management
Attendees have been muted
You may submit questions at any
time, but we will respond at the
conclusion of the presentation
during the Q&A session
Before We Begin
© 2017 Veridium IP Ltd. All rights reserved
John Spencer
Chief Product Officer
• Industry expert with over 30 years of experience
• Former CTO at Citrix in Northern Europe
• Instrumental in delivering commercially successful and
award winning products
Before We Begin
© 2017 Veridium IP Ltd. All rights reserved
• The Password is Dead
• Biometrics as Password Replacement
• Veridium Overview
• Biometric Storage Considerations
• VeridiumAD
• Q&A
AGENDA
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
Weak and compromised passwords continue to be a major attack point for hackers.
The costs are high.
© 2017 Veridium IP Ltd. All rights reserved
Passwords only authorize
access, while
authentication is the
process of verifying the
claim that identity makes.
Identity is the “claim” you
make to access information,
but making that claim with a
password doesn’t prove who
you are.
Only biometrics – your
face, your voice, your
fingerprints – prove
you are who you say
you are.
Proving Identity
Authentication is NOT just about initial logon
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
Reduce data breaches and fraudulent transactions.
Replace what you know – passwords and PINs – with what you are – biometrics.
With our technology, you can replace passwords altogether, or deploy biometrics as
a second factor to strengthen legacy systems.
© 2017 Veridium IP Ltd. All rights reserved
V ER I D I UM OVER VIEW
© 2017 Veridium IP Ltd. All rights reserved
An end-to-end, biometrics-based authentication solution for the Enterprise.
© 2017 Veridium IP Ltd. All rights reserved
We provide all the components necessary for a complete, end-to-end biometric
authentication solution that is flexible, secure, and enterprise ready.
Products Overview
© 2017 Veridium IP Ltd. All rights reserved
WEB
MOB
VPN
CX
AD
App Connectors
Enroll & Authenticate
Authorize & Access
© 2017 Veridium IP Ltd. All rights reserved
• Launch Authenticator Application
• Enter server details & username/password
• Capture Biometrics – 4 Fingers/Face on Mobile
Device
• SMS Notification/Email/Push with activation PIN
• Activate Authenticator with PIN
• Biometric template registered with server and
separated
• Biometrics is now exclusively used for
authentication
© 2017 Veridium IP Ltd. All rights reserved
Enrollment – Identity Must Be Proved
• Mobile Applications
• WEB Applications – Use QR Code/Push
• ‘In’ Application – Push
• VPN Appliances – Push
• RADIUS – Push
• Citrix StoreFront and Netscaler – QR/Push
• Active Directory – QR/Push
© 2017 Veridium IP Ltd. All rights reserved
Application Authentication
• Attempt logon to application/service (username)
• Either scan QR code on device or push notification
sent
• Validate Biometrics – 4 Fingers/Face
• Biometrics verified on VeridiumID server or local
device
• Secure Token sent to service to authorize user
• User is securely authenticated into
application/service
© 2017 Veridium IP Ltd. All rights reserved
Application Authentication
© 2017 Veridium IP Ltd. All rights reserved
BI OMET R I C S TOR AGE
Securing biometric data is paramount. A breach of your system would expose a full set of
biometric user data.
Biometric data is for life, it cannot be reset.
© 2017 Veridium IP Ltd. All rights reserved
Biometric Storage
Our Distributed Data Model is a multi-part process that covers the encryption and storage of the
biometric vector. First, the captured biometric is encrypted with Visual Cryptography. This allows
us to encrypt the vector randomly into two separate pieces. Then, one is stored on the mobile
device and the other on the VeridiumID server for maximum security.
© 2017 Veridium IP Ltd. All rights reserved
Distributed Data
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
• Is significantly more reliable than other
mobile solutions
• Increases complexity of data collected,
enhancing security
• Does not require additional hardware
above 5MP camera + flash
4 Fingers TouchlessID:
© 2017 Veridium IP Ltd. All rights reserved
• False rejection rate (FRR) is as low as 1.4% which
means 98% success rate, regardless of external
conditions. 4 Fingers requires no external hardware.
• We just require a 5MP camera and LED flash.
• 4 Fingers is one of the most secure biometrics available.
• More secure than Face and TouchID and Voice
4 Fingers is reliable in any environment
4 Fingers captured print 4 Fingers processed print Traditional Fingerprint
Scanner
Minutiae vector
The contactless and contact prints are of comparable quality.
The minutia match.
Print Quality
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
L I V EN ES S
© 2017 Veridium IP Ltd. All rights reserved
Is it Real or Fake?
© 2017 Veridium IP Ltd. All rights reserved
Verify the identity claimed by any user, keeping your enterprise data safer and more secure.
Use biometric authentication on desktops (including VDI) and laptops using 4F, Touch or Facial
eliminate Active Directory passwords entirely
VeridiumAD also supports offline scenarios.
© 2017 Veridium IP Ltd. All rights reserved
1. Replace passwords, use Biometrics as
primary or secondary authentication.
2. To log on, user selects their Active Directory
account and clicks “Login.”
3. Use authenticates with face recognition
from desktop camera or using Mobile
device as the authenticator
4. Once verified, user is logged on and can
access their Windows applications and
data.
© 2017 Veridium IP Ltd. All rights reserved
Active Directory
Custom Credential Provider
© 2017 Veridium IP Ltd. All rights reserved
Enrollment Proxy Registration Authority
VeridiumID
Domain Controllers Certificate Services
© 2017 Veridium IP Ltd. All rights reserved
AD Architecture
SAML IdP
Authenticate Once
SSO to SAML Enabled Services© 2017 Veridium IP Ltd. All rights reserved
SAML
© 2017 Veridium IP Ltd. All rights reserved
For more information contact: Info@VeridiumID.com
Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium
QUESTIONS?
© 2017 Veridium IP Ltd. All rights reserved

More Related Content

What's hot

FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Alliance
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative FIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldUbisecure
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of ThingsFIDO Alliance
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Alliance
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO Alliance
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressFIDO Alliance
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyFIDO Alliance
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsFIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile ConnectFIDO Alliance
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 

What's hot (20)

FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 

Similar to Eliminating Passwords with Biometrics for Identity Access Management Webinar

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...WSO2
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationFIDO Alliance
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilecmurtagh
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilenconnolloy
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profileniamh_donovan
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilehopster78
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoTFIDO Alliance
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mailsAuthShield Labs
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 

Similar to Eliminating Passwords with Biometrics for Identity Access Management Webinar (20)

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Eliminating Passwords with Biometrics for Identity Access Management Webinar

  • 1. © 2017 Veridium IP Ltd. All rights reserved Eliminating Passwords with Biometrics for Identity Access Management
  • 2. Attendees have been muted You may submit questions at any time, but we will respond at the conclusion of the presentation during the Q&A session Before We Begin © 2017 Veridium IP Ltd. All rights reserved
  • 3. John Spencer Chief Product Officer • Industry expert with over 30 years of experience • Former CTO at Citrix in Northern Europe • Instrumental in delivering commercially successful and award winning products Before We Begin © 2017 Veridium IP Ltd. All rights reserved
  • 4. • The Password is Dead • Biometrics as Password Replacement • Veridium Overview • Biometric Storage Considerations • VeridiumAD • Q&A AGENDA © 2017 Veridium IP Ltd. All rights reserved
  • 5. © 2017 Veridium IP Ltd. All rights reserved Weak and compromised passwords continue to be a major attack point for hackers. The costs are high.
  • 6. © 2017 Veridium IP Ltd. All rights reserved Passwords only authorize access, while authentication is the process of verifying the claim that identity makes. Identity is the “claim” you make to access information, but making that claim with a password doesn’t prove who you are. Only biometrics – your face, your voice, your fingerprints – prove you are who you say you are. Proving Identity
  • 7. Authentication is NOT just about initial logon © 2017 Veridium IP Ltd. All rights reserved
  • 8. © 2017 Veridium IP Ltd. All rights reserved Reduce data breaches and fraudulent transactions. Replace what you know – passwords and PINs – with what you are – biometrics. With our technology, you can replace passwords altogether, or deploy biometrics as a second factor to strengthen legacy systems.
  • 9. © 2017 Veridium IP Ltd. All rights reserved V ER I D I UM OVER VIEW
  • 10. © 2017 Veridium IP Ltd. All rights reserved An end-to-end, biometrics-based authentication solution for the Enterprise.
  • 11. © 2017 Veridium IP Ltd. All rights reserved We provide all the components necessary for a complete, end-to-end biometric authentication solution that is flexible, secure, and enterprise ready. Products Overview
  • 12. © 2017 Veridium IP Ltd. All rights reserved
  • 13. WEB MOB VPN CX AD App Connectors Enroll & Authenticate Authorize & Access © 2017 Veridium IP Ltd. All rights reserved
  • 14. • Launch Authenticator Application • Enter server details & username/password • Capture Biometrics – 4 Fingers/Face on Mobile Device • SMS Notification/Email/Push with activation PIN • Activate Authenticator with PIN • Biometric template registered with server and separated • Biometrics is now exclusively used for authentication © 2017 Veridium IP Ltd. All rights reserved Enrollment – Identity Must Be Proved
  • 15. • Mobile Applications • WEB Applications – Use QR Code/Push • ‘In’ Application – Push • VPN Appliances – Push • RADIUS – Push • Citrix StoreFront and Netscaler – QR/Push • Active Directory – QR/Push © 2017 Veridium IP Ltd. All rights reserved Application Authentication
  • 16. • Attempt logon to application/service (username) • Either scan QR code on device or push notification sent • Validate Biometrics – 4 Fingers/Face • Biometrics verified on VeridiumID server or local device • Secure Token sent to service to authorize user • User is securely authenticated into application/service © 2017 Veridium IP Ltd. All rights reserved Application Authentication
  • 17. © 2017 Veridium IP Ltd. All rights reserved BI OMET R I C S TOR AGE
  • 18. Securing biometric data is paramount. A breach of your system would expose a full set of biometric user data. Biometric data is for life, it cannot be reset. © 2017 Veridium IP Ltd. All rights reserved Biometric Storage
  • 19. Our Distributed Data Model is a multi-part process that covers the encryption and storage of the biometric vector. First, the captured biometric is encrypted with Visual Cryptography. This allows us to encrypt the vector randomly into two separate pieces. Then, one is stored on the mobile device and the other on the VeridiumID server for maximum security. © 2017 Veridium IP Ltd. All rights reserved Distributed Data
  • 20. © 2017 Veridium IP Ltd. All rights reserved
  • 21. © 2017 Veridium IP Ltd. All rights reserved
  • 22. © 2017 Veridium IP Ltd. All rights reserved • Is significantly more reliable than other mobile solutions • Increases complexity of data collected, enhancing security • Does not require additional hardware above 5MP camera + flash 4 Fingers TouchlessID:
  • 23. © 2017 Veridium IP Ltd. All rights reserved • False rejection rate (FRR) is as low as 1.4% which means 98% success rate, regardless of external conditions. 4 Fingers requires no external hardware. • We just require a 5MP camera and LED flash. • 4 Fingers is one of the most secure biometrics available. • More secure than Face and TouchID and Voice 4 Fingers is reliable in any environment
  • 24. 4 Fingers captured print 4 Fingers processed print Traditional Fingerprint Scanner Minutiae vector The contactless and contact prints are of comparable quality. The minutia match. Print Quality © 2017 Veridium IP Ltd. All rights reserved
  • 25. © 2017 Veridium IP Ltd. All rights reserved L I V EN ES S
  • 26. © 2017 Veridium IP Ltd. All rights reserved Is it Real or Fake?
  • 27. © 2017 Veridium IP Ltd. All rights reserved
  • 28. Verify the identity claimed by any user, keeping your enterprise data safer and more secure. Use biometric authentication on desktops (including VDI) and laptops using 4F, Touch or Facial eliminate Active Directory passwords entirely VeridiumAD also supports offline scenarios. © 2017 Veridium IP Ltd. All rights reserved
  • 29. 1. Replace passwords, use Biometrics as primary or secondary authentication. 2. To log on, user selects their Active Directory account and clicks “Login.” 3. Use authenticates with face recognition from desktop camera or using Mobile device as the authenticator 4. Once verified, user is logged on and can access their Windows applications and data. © 2017 Veridium IP Ltd. All rights reserved Active Directory
  • 30. Custom Credential Provider © 2017 Veridium IP Ltd. All rights reserved
  • 31. Enrollment Proxy Registration Authority VeridiumID Domain Controllers Certificate Services © 2017 Veridium IP Ltd. All rights reserved AD Architecture
  • 32. SAML IdP Authenticate Once SSO to SAML Enabled Services© 2017 Veridium IP Ltd. All rights reserved SAML
  • 33. © 2017 Veridium IP Ltd. All rights reserved
  • 34. For more information contact: Info@VeridiumID.com Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium QUESTIONS? © 2017 Veridium IP Ltd. All rights reserved