SlideShare a Scribd company logo
1 of 2
Download to read offline
Software Tokens
Two Factor Authentication for your smartphone
Signify helps organisations to secure their computer networks. We provide a secure alternative to
passwords that safely enables remote access to systems and information by delivering two-factor
authentication as an on-demand, hosted service.



                                                                            Key benefits
                                                                            Guaranteed Reliability:
                                                                             • Works without mobile phone network
                                                                               coverage
                                                                             • Distributed and resilient infrastructure
                                                                             • SLA backed service

                                                                            Proven Security:
                                                                             • Market leading RSA software token
                                                                             • Infrastructure designed and managed
                                                                               with security in mind
Signify Software Tokens deliver market leading RSA two factor
                                                                             • Secure web portal administration
authentication by turning a smartphone (BlackBerry or Windows
Mobile) into a strong authentication token. Our service makes it easy       Flexible to your requirements:
to securely identify users 24 x 7 by confirming they have their
                                                                             • Mix our token and tokenless services
smartphone with them. As a fully hosted service we ensure that the
                                                                             • Utilises your user’s existing smartphone
service works securely and reliably.
                                                                               device
Signify Software Tokens are ideal for users who need secure remote           • Variety of contract lengths
access from any computer, but don’t want to carry a token in addition
to their other mobile devices.                                              Quick to deploy:
                                                                             • Compatible with all leading VPNs,
What are Signify Software Tokens?                                              firewalls and web servers
Signify Software Tokens allow a user’s smartphone to be used just like a
                                                                             • No training required
strong authentication token, which they need to have with them when
                                                                             • No physical token to deploy
they wish to remotely access networks, files and applications. Signify
                                                                             • Efficient software token provisioning
delivers RSA software tokens which work just like RSA’s market leading
                                                                               process
SecurID keyfob tokens. You get RSA security and reliability with the
convenience of using your own smartphone, delivered by Signify’s
proven hosted service.

When a user wishes to access their corporate data remotely using a PC
or laptop, they simply enter their secret PIN into their smartphone
token application. The smartphone then generates a one time passcode
which the user then enters into the password field on their PC or
laptop. By demonstrating that they have these two ‘factors’ – a secret
PIN and their smartphone – the user is securely identified.

Signify Software Tokens provide a better user experience because they
enable users to use their preferred mobile device to authenticate
themselves. Users usually tend to look after their smartphones more
carefully than a keyfob token and are therefore less likely to lose them.
When lost, they are more likely to report that fact, enabling the token
to be disabled, ensuring that your corporate security is maintained.
A Complete Managed Service
The successful deployment of two-factor authentication takes more than just technology; you also need to implement a
framework of policies, procedures, logistics and user support. These are automated through key features of our service:

Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data
centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years.

The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use
web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself.

End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems
such as forgotten PINs. This reduces your costs and improves the end user experience.

Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s
smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining
the set up procedure for each user, to ensure they can start working first time, every time, without adding load to
your already busy IT team.

You may not want a software token for all your users? Signify’s range of services make it easy
for you to give each user the most appropriate form of authentication to match their working pattern and security
privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode
OnDemand services.




   Included Features
   Authentication Device                      Uses the existing smartphone each user already carries
                                              Software token is installed as an additional application

   Authentication Service                     Annual service fee per user
                                              Unlimited authentications per user

   Organisation Base Pack                     IMC web portal for administration
                                              Telephone/e-mail support for administrators from our dedicated support team
                                              End user web helpdesk for automated resolution of end user issues

   Optional Features                          Discounts for multi-year contracts
                                              Software token life to suit how long you keep your smartphones




Authorised partner:




                                                                                                                     info@signify.net www.signify.net
                                                                                                                                +44 (0)1223 472572
©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks
of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.

More Related Content

What's hot

Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzenThomas Dehler
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing ServiceSymantec
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSRapidSSLOnline.com
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Mdc Brochure
Mdc BrochureMdc Brochure
Mdc Brochuremartgroot
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas GeneXus
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 

What's hot (16)

Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
Mdc Brochure
Mdc BrochureMdc Brochure
Mdc Brochure
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 

Viewers also liked

Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...Cyber Security Alliance
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Implementing Enterprise PPM for Multi-Maturity Organizations
Implementing Enterprise PPM for Multi-Maturity Organizations Implementing Enterprise PPM for Multi-Maturity Organizations
Implementing Enterprise PPM for Multi-Maturity Organizations EPM Live
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free softwareGiuseppe Paterno'
 

Viewers also liked (6)

Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Implementing Enterprise PPM for Multi-Maturity Organizations
Implementing Enterprise PPM for Multi-Maturity Organizations Implementing Enterprise PPM for Multi-Maturity Organizations
Implementing Enterprise PPM for Multi-Maturity Organizations
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
 

Similar to Signify Software Tokens

Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewkate_holden
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewpjpallen
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarForgeRock
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeNet
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 

Similar to Signify Software Tokens (20)

Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Signify Software Tokens

  • 1. Software Tokens Two Factor Authentication for your smartphone Signify helps organisations to secure their computer networks. We provide a secure alternative to passwords that safely enables remote access to systems and information by delivering two-factor authentication as an on-demand, hosted service. Key benefits Guaranteed Reliability: • Works without mobile phone network coverage • Distributed and resilient infrastructure • SLA backed service Proven Security: • Market leading RSA software token • Infrastructure designed and managed with security in mind Signify Software Tokens deliver market leading RSA two factor • Secure web portal administration authentication by turning a smartphone (BlackBerry or Windows Mobile) into a strong authentication token. Our service makes it easy Flexible to your requirements: to securely identify users 24 x 7 by confirming they have their • Mix our token and tokenless services smartphone with them. As a fully hosted service we ensure that the • Utilises your user’s existing smartphone service works securely and reliably. device Signify Software Tokens are ideal for users who need secure remote • Variety of contract lengths access from any computer, but don’t want to carry a token in addition to their other mobile devices. Quick to deploy: • Compatible with all leading VPNs, What are Signify Software Tokens? firewalls and web servers Signify Software Tokens allow a user’s smartphone to be used just like a • No training required strong authentication token, which they need to have with them when • No physical token to deploy they wish to remotely access networks, files and applications. Signify • Efficient software token provisioning delivers RSA software tokens which work just like RSA’s market leading process SecurID keyfob tokens. You get RSA security and reliability with the convenience of using your own smartphone, delivered by Signify’s proven hosted service. When a user wishes to access their corporate data remotely using a PC or laptop, they simply enter their secret PIN into their smartphone token application. The smartphone then generates a one time passcode which the user then enters into the password field on their PC or laptop. By demonstrating that they have these two ‘factors’ – a secret PIN and their smartphone – the user is securely identified. Signify Software Tokens provide a better user experience because they enable users to use their preferred mobile device to authenticate themselves. Users usually tend to look after their smartphones more carefully than a keyfob token and are therefore less likely to lose them. When lost, they are more likely to report that fact, enabling the token to be disabled, ensuring that your corporate security is maintained.
  • 2. A Complete Managed Service The successful deployment of two-factor authentication takes more than just technology; you also need to implement a framework of policies, procedures, logistics and user support. These are automated through key features of our service: Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years. The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself. End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems such as forgotten PINs. This reduces your costs and improves the end user experience. Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining the set up procedure for each user, to ensure they can start working first time, every time, without adding load to your already busy IT team. You may not want a software token for all your users? Signify’s range of services make it easy for you to give each user the most appropriate form of authentication to match their working pattern and security privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode OnDemand services. Included Features Authentication Device Uses the existing smartphone each user already carries Software token is installed as an additional application Authentication Service Annual service fee per user Unlimited authentications per user Organisation Base Pack IMC web portal for administration Telephone/e-mail support for administrators from our dedicated support team End user web helpdesk for automated resolution of end user issues Optional Features Discounts for multi-year contracts Software token life to suit how long you keep your smartphones Authorised partner: info@signify.net www.signify.net +44 (0)1223 472572 ©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.