SlideShare a Scribd company logo
1 of 18
Lynne Cadenhead
Secure Email Communications - Bio ID SC
3 November 2015
Emails, Emails, Emails…
•2.6 billion email users worldwide
•A billion emails sent per hour
•12 million business emails sent every second
•122 average per person per day
•156 million phishing emails every day (80,000 scammed)
•9 out of 10 viruses infect via an email
Lynne Cadenhead, Bio ID Security 3 November 2015
Cybercrime
• The Snowden effect
• Global costs of cybercrime rapidly
escalating towards £300 billion per annum
• Virtual pandemic of concern circulating the
globe
• Painfully aware of need to protect identity
and data
• Immense drawbacks in current security
solutions
Lynne Cadenhead, Bio ID Security 3 November 2015
£300 billion
Annual Costs of
Cybercrime
£300 Million theft
from UK bank
accounts due to
hacking
Who are you?
Network/physical
address
Palm
prints
Iris scans
Finger prints
Digital
certificate
Retina
scan
Smart card
Something you
are
Something you
have
Something you
know
Username/
password
Mother’s maiden name
Password Problems
•Most people use expensive, obselete and insecure passwords as a means of user
identification
•The password and user id combination is dead as a means of securely identifying a
person
•90% user generated password hacked in minutes
•Password Problems – 70% costs of IT Service Desk
Secure Alternative – Biometrics
The process of converting unique biological characteristics of a person in a digital form
of identification
Without question the only way to be absolutely sure about the identity of a person
Lynne Cadenhead, Bio ID Security 3 November 2015
Bio ID Security Solution
Our products solve quickly, easily, cost-effectively and the
current limitations.
Lynne Cadenhead, Bio ID Security 3 November 2015
We provide superior and robust security
solutions for large, global organisations
BioID Products are no so-called "mass market security
gimmicks", but an important and much-sought-after progress
toward real security
Bio ID Security
•Transformational proprietary software fuses biometrics and
AES256 encryption
•Person to Person (P2P) Secure Email Tunnel
•Eliminates costs of cumbersome Digital Certificates
•Fully integrated into Microsoft Active Directory
•Multi-factor biometric cloud-based platform
•Over 20 man years development
•Simplicity belies its sophistication
•Complete Authentication
Lynne Cadenhead, Bio ID Security 3 November 2015
E-mail Encryption
Bob
Server
User
Device
Intermediate
device
Intermediate
device
Service
End-to-end authentication
Server
User
Device
Intermediate
device
Intermediate
device
Intermediate authentication
Service
ServerDevice
Intermediate
device
Intermediate
device
Complete Authentication (Bio-ID)
Service Alice
Bob
Bob
Bio ID Enterprise Suite
Bio ID Enterprise Suite
J2EE Enterprise Server ( acts as Root Server for generating PKI and digital
signatures, and combines multiple Active Directories enabling administration
of AD users in multiple remote locations)
Bio ID Enterprise Server ( fully integrated extension of Microsoft Active
Directory, handles various biometrics in one AD (MS 2008R2 - 2012R2)
Lynne Cadenhead, Bio ID Security 3 November 2015
Bio ID Modules
Individual Modules
Bio ID Logon
Extension to replace passwords with biometrics, stand alone or
networkable, proprietary minutiae-based fingerprint algorithm,
stored as encypted template)
Bio ID Secure Communications
MS Outlook plugin, AES 256 encryption, digital signature based
on biometrics
Lynne Cadenhead, Bio ID Security 3 November 2015
Fingerprint replaces your password
MS Active Directory – Central Enrollment
Fingerprint replaces your password
Log in process
Fingerprint replaces your password
MS Active Directory
Secure Email Communication
Secure Email Communication
Show what
the user sees
Secure Email Communication
Secure Email Communication
Bio ID SC - Secure Email Communication
•Data Loss Prevention (DLP) and High Risk Information
Sharing (HRIS)
•Creates a complete “Person-to-Person Tunnel" for emails
•Biometrics provides secure authentication of the sender and
recipient
•Protects emails in any status:
• In the system (data at-rest)
• In transmission (data in-motion)
• In temporary stage i.e. opening up (data in-process)
Lynne Cadenhead
Secure Email Communications - Bio ID SC
3 November 2015
QUESTIONS

More Related Content

What's hot

What's hot (18)

ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
itsMERocks Pitch Deck
itsMERocks Pitch DeckitsMERocks Pitch Deck
itsMERocks Pitch Deck
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
 
Bit Defender Anti virus by Anupam
Bit Defender Anti virus by AnupamBit Defender Anti virus by Anupam
Bit Defender Anti virus by Anupam
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Cloud security
Cloud securityCloud security
Cloud security
 
Managed Iot services in pune
Managed Iot services in puneManaged Iot services in pune
Managed Iot services in pune
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Access RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor AuthenticationAccess RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor Authentication
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 

Similar to Bio-d Security

Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
Creus Moreira Carlos
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
Nicholas Davis
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Nicholas Davis
 

Similar to Bio-d Security (20)

Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 

More from Napier University

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 

Recently uploaded (20)

Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 

Bio-d Security

  • 1. Lynne Cadenhead Secure Email Communications - Bio ID SC 3 November 2015
  • 2. Emails, Emails, Emails… •2.6 billion email users worldwide •A billion emails sent per hour •12 million business emails sent every second •122 average per person per day •156 million phishing emails every day (80,000 scammed) •9 out of 10 viruses infect via an email Lynne Cadenhead, Bio ID Security 3 November 2015
  • 3. Cybercrime • The Snowden effect • Global costs of cybercrime rapidly escalating towards £300 billion per annum • Virtual pandemic of concern circulating the globe • Painfully aware of need to protect identity and data • Immense drawbacks in current security solutions Lynne Cadenhead, Bio ID Security 3 November 2015 £300 billion Annual Costs of Cybercrime £300 Million theft from UK bank accounts due to hacking
  • 4. Who are you? Network/physical address Palm prints Iris scans Finger prints Digital certificate Retina scan Smart card Something you are Something you have Something you know Username/ password Mother’s maiden name
  • 5. Password Problems •Most people use expensive, obselete and insecure passwords as a means of user identification •The password and user id combination is dead as a means of securely identifying a person •90% user generated password hacked in minutes •Password Problems – 70% costs of IT Service Desk Secure Alternative – Biometrics The process of converting unique biological characteristics of a person in a digital form of identification Without question the only way to be absolutely sure about the identity of a person Lynne Cadenhead, Bio ID Security 3 November 2015
  • 6. Bio ID Security Solution Our products solve quickly, easily, cost-effectively and the current limitations. Lynne Cadenhead, Bio ID Security 3 November 2015 We provide superior and robust security solutions for large, global organisations BioID Products are no so-called "mass market security gimmicks", but an important and much-sought-after progress toward real security
  • 7. Bio ID Security •Transformational proprietary software fuses biometrics and AES256 encryption •Person to Person (P2P) Secure Email Tunnel •Eliminates costs of cumbersome Digital Certificates •Fully integrated into Microsoft Active Directory •Multi-factor biometric cloud-based platform •Over 20 man years development •Simplicity belies its sophistication •Complete Authentication Lynne Cadenhead, Bio ID Security 3 November 2015
  • 8. E-mail Encryption Bob Server User Device Intermediate device Intermediate device Service End-to-end authentication Server User Device Intermediate device Intermediate device Intermediate authentication Service ServerDevice Intermediate device Intermediate device Complete Authentication (Bio-ID) Service Alice Bob Bob
  • 9. Bio ID Enterprise Suite Bio ID Enterprise Suite J2EE Enterprise Server ( acts as Root Server for generating PKI and digital signatures, and combines multiple Active Directories enabling administration of AD users in multiple remote locations) Bio ID Enterprise Server ( fully integrated extension of Microsoft Active Directory, handles various biometrics in one AD (MS 2008R2 - 2012R2) Lynne Cadenhead, Bio ID Security 3 November 2015
  • 10. Bio ID Modules Individual Modules Bio ID Logon Extension to replace passwords with biometrics, stand alone or networkable, proprietary minutiae-based fingerprint algorithm, stored as encypted template) Bio ID Secure Communications MS Outlook plugin, AES 256 encryption, digital signature based on biometrics Lynne Cadenhead, Bio ID Security 3 November 2015
  • 11. Fingerprint replaces your password MS Active Directory – Central Enrollment
  • 12. Fingerprint replaces your password Log in process
  • 13. Fingerprint replaces your password MS Active Directory
  • 15. Secure Email Communication Show what the user sees
  • 17. Secure Email Communication Bio ID SC - Secure Email Communication •Data Loss Prevention (DLP) and High Risk Information Sharing (HRIS) •Creates a complete “Person-to-Person Tunnel" for emails •Biometrics provides secure authentication of the sender and recipient •Protects emails in any status: • In the system (data at-rest) • In transmission (data in-motion) • In temporary stage i.e. opening up (data in-process)
  • 18. Lynne Cadenhead Secure Email Communications - Bio ID SC 3 November 2015 QUESTIONS

Editor's Notes

  1. Schöne guten Tag, mein Name ist Elmar Hilgers, Geschäftsführer der PCK. Wir sind seit 2008 Partner der Wortmann AG
  2. Schöne guten Tag, mein Name ist Elmar Hilgers, Geschäftsführer der PCK. Wir sind seit 2008 Partner der Wortmann AG