5. Is your system bulletproof? Standard Version + Bulletproof Version Bulletproof Protection Standard Protection
6.
7.
8.
9.
10. Fingerprint Scan = Maximum Security Biometric technology offers the highest security
11.
12. What devices can verify user identity? Plus one of these … (optional) + Potential Future Development
13. bioLock is compatible with over 80 laptops (with built-in fingerprint sensor) and over 50 independent devices like mice, keyboards, or PCMCIA Cards. is hardware independent Cherry ID Mouse Convenient Touch Sensor bioLock ID Mouse Powered by Secugen Leading Laptops 23% have Swipe Sensors Secugen Hamster FIPS 201 Compliant UPEK Eikon Low-cost Device Cherry Keyboard Smart Card Option Zvetco P5000 High End Device
14. SAP ® log-on & system access with Logon Logon authorized Logon blocked bioLock checks authentication rules bioLock user/ function bioLock prompts you for fingerprint Fingerprint comparison with table bioLock templates bioLock identifies unique points (minutiae) within a fingerprint and creates an encrypted, digital template – no images of fingerprints are ever stored! Note:
15.
16. System Log-on Transaction Bulletproof Security requires 5 Levels Any Field Perimeter Security - Level I Transactions – Level II Fields - Level III All levels can be controlled using fingerprint scan! Financial Limits – Level IV Dual Approval – Level V
17.
18.
19. Example: Who Has Access? Fraud is mostly committed by stealing or cracking a password to access profiles with critical, extended authorizations External Employees Former Employees Hackers Criminals The threat comes from the inside and outside! Consultants Auditors 6,000 Named SAP Users 2,000 Users with potential access to critical data 1,000 Users with restricted roles to critical functions VIP Only: 500 Permitted bioLock Users for most critical functions Bulletproof Data Protection
20.
21.
22. User logs on using their SAP User Profile and password Example – what a user sees… User is prompted for a fingerprint scan to complete log-on (Security Level I)
23. User selects the transaction “ME21N” to create a purchase order NOTE: This could be virtually any R/3 transaction such as SE16 or SE38 Example – what a user sees… User is prompted for a fingerprint scan to complete the activity (Security Level II)
24. User attempts to look up Health Plan information under Infotype 167 Example – what a user sees… Infotype 167 (field level) is protected for HIPAA compliance, so user is prompted for fingerprint scan (Security Level III)
25.
26.
27.
28.
29. bioLock is SAP certified - SAP ® certified since 2002 Visit: www.bioLock.us
30. realtime North America, Inc. WORLD TRADE CENTER 1101 Channelside Drive, Tampa, FL 33602 T: 813-283-0070 F: 813-283-0071 Email: info@biolock.us Web: www.bioLock.us Martin Lum Director of Business Development, Northeast 813-310-7007 Please contact us for a demonstration or pilot installation: 1-877-bioLock [email_address]
Editor's Notes
bioLock is the first SAP certified biometric identity management system. bioLock has 3-level security protection: Level I - SAP Logon, Level II - Transactions, Level III - Data. bioLock will uniquely identify the “actual user” and log all activities. Sarbanes-Oxley Section 404 requires that companies develop strong internal controls to prevent and detect fraud. With over 20 ways to get access to passwords, fraud prevention cannot be accomplished. bioLock offers Internal Control and Audit departments not only the ability to prevent unauthorized access on all levels, but also to proof, who did what and when within the mySAP ERP System.