SlideShare a Scribd company logo
1 of 14
|
Passwords today, PASSCODES tomorrow
Webinar December 2nd, 2015
Markus Behr, Director Professional Services at Xura
Lars Gotlieb, Regional Manager DACH at SMS Passcode
02.12.2015
PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.151
||
Why single factor authentication struggles after >30 years of usage
Passwords today
2 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
The easy principle of single factor authentication:
a password is something only you know
The problem with single factor authentication:
a password is no longer something only you know
||
Our passwords are too easy
Passwords today
3 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Check yourself at Intel:
https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html
Longest time to break your account
using one of the most common passwords:
||
Our passwords are too short
Passwords today
4 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Modern CPUs/GPUs of standard computers
can try > 1 billion passwords per second
Check yourself at Intel:
https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html
Time to break your account
with a numeric password 6 digits long 524017
Check yourself at Intel:
https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html
Time to break your account
with an alphanumeric/special chars password 8 characters long §Zg71kö5
Check yourself at Intel:
https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html
Time to break your account
with an alphanumeric password 10 characters long Tn5%w-9Uo2
Are you updating your secure password every 2 weeks?
Check yourself at Intel:
https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html
Time to break your account
with an alphanumeric password 7 characters long 8Dhr2Pz
http://content.time.com/time/interactive/0,31813,2048601,00.html
||
Our passwords are not securely stored
Passwords today
5 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
http://www.inquisitr.com/2385536/225k-iphones-hacked-passwords-stolen-by-malware/
http://www.wired.co.uk/news/archive/2015-11/25/mr-grey-hacker-controls-12-billion-stolen-logins
http://thehackernews.com/2015/09/ashley-madison-password-cracked.html
http://thehackernews.com/2015/10/free-web-hosting-hacking.html
http://www.cio-today.com/article/index.php?story_id=023000QNX0I2
http://www.scmagazine.com/patreons-hack-exposes-data-on-23-million-users/article/443518/
examples for big data breaches
from the press since Sept. 2015
||
We secure e.g. banking transactions by adding a further factor
2-Factor-Authentication
6 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Something you have:
mTAN / OTP
Something you know:
Password +
typically distributed to separate
device e.g. smartphone
Xura globally transports your OTP to the end users’ mobile devices through our
certified, highly secure platform with global reach and premium SLA options
Xura provides easy to integrate APIs to generate and verify OTPs
to secure e.g. your consumer based processes
Xura technology comes integrated with turn key strong authentication
by SMS Passcode to secure your internal systems
OTP transport
OTP APIs
OTP software
||
while mobile attack scenarios are coming up to weaken the 2nd factor
(like by malware, SIM swap, HLR spoofing, etc.)
for internal systems many enterprises still trust in pure password authentication
Think smarter – next-gen multifactor authentication
Passcodes tomorrow
7 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Something you have:
mTAN / OTP
Something you know:
Password +
Xura and SMS Passcode raise security by adaptive multifactor authentication
Something you have:
Hardened mobile device
+
Added context relation:
Check of additional factors
+
Something you have:
PASSCODE
Something you are:
Biometrics
|8 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
trustego
hardened mobile devices
||
trustego technology by Xura
enables secure mobile IP messaging
9 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
trustego is one of the most secure systems,
to receive mobile messages and PIN/mTAN
codes on a smartphone or tablet today
Global coverage via IP access (GSM + WLAN) and SMS fallback
Highest security standards, TÜV i-sec certificated
Branded, rich-media msgs with secure attachments and read receipt
Option of interactive click-based processes with highest usability
Available as trustego app, dedicated app solutions or trustego SDK
Binds messages to the users mobile identity (MSISDN) and device
Secured message transfer and storage
||
trustego
advanced message design
10 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Secure Inbox and Archiv
(+ optional PIN Code Secure App)
Dynamic Sender &
Automated sender branding
(colour + logo)
Support for overlong text
and HTML format
Transportation of Rich
Media elements, links
and secure attachments
(e.g. images or pdfs)
Limited Validity of
message and action
(optionally)
Secure click-based interaction
over encrypted channel
(optionally)
||
trustego
cutting edge mobile security
11 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Messages are delivered via a geo-redundant and regularly audited platform
in ISO/IEC 27001 certified colocations, reaching users anywhere and any time, in under 1 second.
Server side security with fraud detection. Signed and encrypted message transfer. Secure and encrypted local storage.
No attackable local algorithm for TAN / Token generation on the mobile device.
HTTP/S w. client certificate
Highest supported encryption
iOS key chain and own Android key chain
code obfuscation and anti-reverse-engineering
SteganographyJailbreak and Root detection
PIN lockMessage timeout
Message archive
Security updates
version check
HTTP POST / Header
One click authentication with encrypted backchannel
push notification
verifiable read receipttheft lock
|12 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Context adapted
multifactor security
||
Your contacts
13 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Markus Behr
Director Professional Services
Acision Secure Communications GmbH
a Xura company
Phone: +49 (0) 89 20 17 27 64
Mobil: +49 (0) 172 8389 564
E-Mail: markus.behr@xura.com
Lars Gotlieb
Regional Manager DACH
SMS PASSCODE A/S
Phone: +49 (0) 89 99216 407
Mobile: +49 (0) 175 9572 602
E-Mail: lgo@smspasscode.com
Achieving
Customer Success
2000+customers
800k+users
99%customer satisfaction
||14 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Think smarter – next-gen multifactor authentication
Passcodes tomorrow
14 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15
Something you have:
PASSCODE
Another example:
Password +
Launch the App Look at the camera Read the passphrase
Something you are:
Biometrics
Smartphone based
face and voice recognition
Proof who you are:
Video legitimation
Video and audio based identification
through Smartphone or Browser
PASSPORT

More Related Content

What's hot

Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedArash Ramez
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere générationSylvain Maret
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneArash Ramez
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)Maarten Mulders
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTeccshergi
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key ManagementNCC Group
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 
RBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWCRBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWCCHARGE Anywhere
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile SecurityMichalis Kamprianis
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 

What's hot (19)

Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
 
Network Security
Network SecurityNetwork Security
Network Security
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
RBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWCRBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWC
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 

Similar to Passwords today passcodes tomorrow: Webinar December 2nd, 2015

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token2FA, Inc.
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security IncidentsEchoworx
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTWD Industries AG
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 

Similar to Passwords today passcodes tomorrow: Webinar December 2nd, 2015 (20)

Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Octopus Authentication Platform
Octopus Authentication PlatformOctopus Authentication Platform
Octopus Authentication Platform
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 

More from Xura

Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
 
Keynote Presentation: Hybrid Deployment for RTC PaaS
Keynote Presentation: Hybrid Deployment for RTC PaaSKeynote Presentation: Hybrid Deployment for RTC PaaS
Keynote Presentation: Hybrid Deployment for RTC PaaSXura
 
Messaging in an NFV environment: Service success strategies
Messaging in an NFV environment: Service success strategiesMessaging in an NFV environment: Service success strategies
Messaging in an NFV environment: Service success strategiesXura
 
Webinar: To be or not to be...NFV
Webinar: To be or not to be...NFVWebinar: To be or not to be...NFV
Webinar: To be or not to be...NFVXura
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Xura
 
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...Xura
 

More from Xura (6)

Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
 
Keynote Presentation: Hybrid Deployment for RTC PaaS
Keynote Presentation: Hybrid Deployment for RTC PaaSKeynote Presentation: Hybrid Deployment for RTC PaaS
Keynote Presentation: Hybrid Deployment for RTC PaaS
 
Messaging in an NFV environment: Service success strategies
Messaging in an NFV environment: Service success strategiesMessaging in an NFV environment: Service success strategies
Messaging in an NFV environment: Service success strategies
 
Webinar: To be or not to be...NFV
Webinar: To be or not to be...NFVWebinar: To be or not to be...NFV
Webinar: To be or not to be...NFV
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
 
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
 

Passwords today passcodes tomorrow: Webinar December 2nd, 2015

  • 1. | Passwords today, PASSCODES tomorrow Webinar December 2nd, 2015 Markus Behr, Director Professional Services at Xura Lars Gotlieb, Regional Manager DACH at SMS Passcode 02.12.2015 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.151
  • 2. || Why single factor authentication struggles after >30 years of usage Passwords today 2 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 The easy principle of single factor authentication: a password is something only you know The problem with single factor authentication: a password is no longer something only you know
  • 3. || Our passwords are too easy Passwords today 3 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Check yourself at Intel: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html Longest time to break your account using one of the most common passwords:
  • 4. || Our passwords are too short Passwords today 4 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Modern CPUs/GPUs of standard computers can try > 1 billion passwords per second Check yourself at Intel: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html Time to break your account with a numeric password 6 digits long 524017 Check yourself at Intel: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html Time to break your account with an alphanumeric/special chars password 8 characters long §Zg71kö5 Check yourself at Intel: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html Time to break your account with an alphanumeric password 10 characters long Tn5%w-9Uo2 Are you updating your secure password every 2 weeks? Check yourself at Intel: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html Time to break your account with an alphanumeric password 7 characters long 8Dhr2Pz http://content.time.com/time/interactive/0,31813,2048601,00.html
  • 5. || Our passwords are not securely stored Passwords today 5 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 http://www.inquisitr.com/2385536/225k-iphones-hacked-passwords-stolen-by-malware/ http://www.wired.co.uk/news/archive/2015-11/25/mr-grey-hacker-controls-12-billion-stolen-logins http://thehackernews.com/2015/09/ashley-madison-password-cracked.html http://thehackernews.com/2015/10/free-web-hosting-hacking.html http://www.cio-today.com/article/index.php?story_id=023000QNX0I2 http://www.scmagazine.com/patreons-hack-exposes-data-on-23-million-users/article/443518/ examples for big data breaches from the press since Sept. 2015
  • 6. || We secure e.g. banking transactions by adding a further factor 2-Factor-Authentication 6 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Something you have: mTAN / OTP Something you know: Password + typically distributed to separate device e.g. smartphone Xura globally transports your OTP to the end users’ mobile devices through our certified, highly secure platform with global reach and premium SLA options Xura provides easy to integrate APIs to generate and verify OTPs to secure e.g. your consumer based processes Xura technology comes integrated with turn key strong authentication by SMS Passcode to secure your internal systems OTP transport OTP APIs OTP software
  • 7. || while mobile attack scenarios are coming up to weaken the 2nd factor (like by malware, SIM swap, HLR spoofing, etc.) for internal systems many enterprises still trust in pure password authentication Think smarter – next-gen multifactor authentication Passcodes tomorrow 7 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Something you have: mTAN / OTP Something you know: Password + Xura and SMS Passcode raise security by adaptive multifactor authentication Something you have: Hardened mobile device + Added context relation: Check of additional factors + Something you have: PASSCODE Something you are: Biometrics
  • 8. |8 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 trustego hardened mobile devices
  • 9. || trustego technology by Xura enables secure mobile IP messaging 9 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 trustego is one of the most secure systems, to receive mobile messages and PIN/mTAN codes on a smartphone or tablet today Global coverage via IP access (GSM + WLAN) and SMS fallback Highest security standards, TÜV i-sec certificated Branded, rich-media msgs with secure attachments and read receipt Option of interactive click-based processes with highest usability Available as trustego app, dedicated app solutions or trustego SDK Binds messages to the users mobile identity (MSISDN) and device Secured message transfer and storage
  • 10. || trustego advanced message design 10 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Secure Inbox and Archiv (+ optional PIN Code Secure App) Dynamic Sender & Automated sender branding (colour + logo) Support for overlong text and HTML format Transportation of Rich Media elements, links and secure attachments (e.g. images or pdfs) Limited Validity of message and action (optionally) Secure click-based interaction over encrypted channel (optionally)
  • 11. || trustego cutting edge mobile security 11 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Messages are delivered via a geo-redundant and regularly audited platform in ISO/IEC 27001 certified colocations, reaching users anywhere and any time, in under 1 second. Server side security with fraud detection. Signed and encrypted message transfer. Secure and encrypted local storage. No attackable local algorithm for TAN / Token generation on the mobile device. HTTP/S w. client certificate Highest supported encryption iOS key chain and own Android key chain code obfuscation and anti-reverse-engineering SteganographyJailbreak and Root detection PIN lockMessage timeout Message archive Security updates version check HTTP POST / Header One click authentication with encrypted backchannel push notification verifiable read receipttheft lock
  • 12. |12 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Context adapted multifactor security
  • 13. || Your contacts 13 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Markus Behr Director Professional Services Acision Secure Communications GmbH a Xura company Phone: +49 (0) 89 20 17 27 64 Mobil: +49 (0) 172 8389 564 E-Mail: markus.behr@xura.com Lars Gotlieb Regional Manager DACH SMS PASSCODE A/S Phone: +49 (0) 89 99216 407 Mobile: +49 (0) 175 9572 602 E-Mail: lgo@smspasscode.com Achieving Customer Success 2000+customers 800k+users 99%customer satisfaction
  • 14. ||14 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Think smarter – next-gen multifactor authentication Passcodes tomorrow 14 PASSWORDS TODAY, PASSCODES TOMORROW | 02.12.15 Something you have: PASSCODE Another example: Password + Launch the App Look at the camera Read the passphrase Something you are: Biometrics Smartphone based face and voice recognition Proof who you are: Video legitimation Video and audio based identification through Smartphone or Browser PASSPORT

Editor's Notes

  1. Moore‘s law Mulit-Core CPUs and GPUs Cloud computing power ---- Most „secure passwords“ still 8 characters
  2. Together we are bigger, we reach further and we think smarter Bigger means: Behaving as a Industry leader in digital communication • leveraging our market share to your advantage • Evolving product portfolio to solve your business problems Further means: Helping you today but more importantly Bridging you to where your destination is going to be Advancing your technology needs along every conceivable evolution path Smarter means: Leveraging our 20+ years’ experience • Powering innovation, especially in advanced IP solutions
  3. Automated sender branding by the server improves message integrity
  4. Together we are bigger, we reach further and we think smarter Bigger means: Behaving as a Industry leader in digital communication • leveraging our market share to your advantage • Evolving product portfolio to solve your business problems Further means: Helping you today but more importantly Bridging you to where your destination is going to be Advancing your technology needs along every conceivable evolution path Smarter means: Leveraging our 20+ years’ experience • Powering innovation, especially in advanced IP solutions