SlideShare a Scribd company logo
© 2017 Veridium IP Ltd. All rights reserved
Eliminating Passwords with
Biometrics for Identity Access
Management
Attendees have been muted
You may submit questions at any
time, but we will respond at the
conclusion of the presentation
during the Q&A session
Before We Begin
© 2017 Veridium IP Ltd. All rights reserved
John Spencer
Chief Product Officer
• Industry expert with over 30 years of experience
• Former CTO at Citrix in Northern Europe
• Instrumental in delivering commercially successful and
award winning products
Before We Begin
© 2017 Veridium IP Ltd. All rights reserved
• The Password is Dead
• Biometrics as Password Replacement
• Veridium Overview
• Biometric Storage Considerations
• VeridiumAD
• Q&A
AGENDA
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
Weak and compromised passwords continue to be a major attack point for hackers.
The costs are high.
© 2017 Veridium IP Ltd. All rights reserved
Passwords only authorize
access, while
authentication is the
process of verifying the
claim that identity makes.
Identity is the “claim” you
make to access information,
but making that claim with a
password doesn’t prove who
you are.
Only biometrics – your
face, your voice, your
fingerprints – prove
you are who you say
you are.
Proving Identity
Authentication is NOT just about initial logon
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
Reduce data breaches and fraudulent transactions.
Replace what you know – passwords and PINs – with what you are – biometrics.
With our technology, you can replace passwords altogether, or deploy biometrics as
a second factor to strengthen legacy systems.
© 2017 Veridium IP Ltd. All rights reserved
V ER I D I UM OVER VIEW
© 2017 Veridium IP Ltd. All rights reserved
An end-to-end, biometrics-based authentication solution for the Enterprise.
© 2017 Veridium IP Ltd. All rights reserved
We provide all the components necessary for a complete, end-to-end biometric
authentication solution that is flexible, secure, and enterprise ready.
Products Overview
© 2017 Veridium IP Ltd. All rights reserved
WEB
MOB
VPN
CX
AD
App Connectors
Enroll & Authenticate
Authorize & Access
© 2017 Veridium IP Ltd. All rights reserved
• Launch Authenticator Application
• Enter server details & username/password
• Capture Biometrics – 4 Fingers/Face on Mobile
Device
• SMS Notification/Email/Push with activation PIN
• Activate Authenticator with PIN
• Biometric template registered with server and
separated
• Biometrics is now exclusively used for
authentication
© 2017 Veridium IP Ltd. All rights reserved
Enrollment – Identity Must Be Proved
• Mobile Applications
• WEB Applications – Use QR Code/Push
• ‘In’ Application – Push
• VPN Appliances – Push
• RADIUS – Push
• Citrix StoreFront and Netscaler – QR/Push
• Active Directory – QR/Push
© 2017 Veridium IP Ltd. All rights reserved
Application Authentication
• Attempt logon to application/service (username)
• Either scan QR code on device or push notification
sent
• Validate Biometrics – 4 Fingers/Face
• Biometrics verified on VeridiumID server or local
device
• Secure Token sent to service to authorize user
• User is securely authenticated into
application/service
© 2017 Veridium IP Ltd. All rights reserved
Application Authentication
© 2017 Veridium IP Ltd. All rights reserved
BI OMET R I C S TOR AGE
Securing biometric data is paramount. A breach of your system would expose a full set of
biometric user data.
Biometric data is for life, it cannot be reset.
© 2017 Veridium IP Ltd. All rights reserved
Biometric Storage
Our Distributed Data Model is a multi-part process that covers the encryption and storage of the
biometric vector. First, the captured biometric is encrypted with Visual Cryptography. This allows
us to encrypt the vector randomly into two separate pieces. Then, one is stored on the mobile
device and the other on the VeridiumID server for maximum security.
© 2017 Veridium IP Ltd. All rights reserved
Distributed Data
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
• Is significantly more reliable than other
mobile solutions
• Increases complexity of data collected,
enhancing security
• Does not require additional hardware
above 5MP camera + flash
4 Fingers TouchlessID:
© 2017 Veridium IP Ltd. All rights reserved
• False rejection rate (FRR) is as low as 1.4% which
means 98% success rate, regardless of external
conditions. 4 Fingers requires no external hardware.
• We just require a 5MP camera and LED flash.
• 4 Fingers is one of the most secure biometrics available.
• More secure than Face and TouchID and Voice
4 Fingers is reliable in any environment
4 Fingers captured print 4 Fingers processed print Traditional Fingerprint
Scanner
Minutiae vector
The contactless and contact prints are of comparable quality.
The minutia match.
Print Quality
© 2017 Veridium IP Ltd. All rights reserved
© 2017 Veridium IP Ltd. All rights reserved
L I V EN ES S
© 2017 Veridium IP Ltd. All rights reserved
Is it Real or Fake?
© 2017 Veridium IP Ltd. All rights reserved
Verify the identity claimed by any user, keeping your enterprise data safer and more secure.
Use biometric authentication on desktops (including VDI) and laptops using 4F, Touch or Facial
eliminate Active Directory passwords entirely
VeridiumAD also supports offline scenarios.
© 2017 Veridium IP Ltd. All rights reserved
1. Replace passwords, use Biometrics as
primary or secondary authentication.
2. To log on, user selects their Active Directory
account and clicks “Login.”
3. Use authenticates with face recognition
from desktop camera or using Mobile
device as the authenticator
4. Once verified, user is logged on and can
access their Windows applications and
data.
© 2017 Veridium IP Ltd. All rights reserved
Active Directory
Custom Credential Provider
© 2017 Veridium IP Ltd. All rights reserved
Enrollment Proxy Registration Authority
VeridiumID
Domain Controllers Certificate Services
© 2017 Veridium IP Ltd. All rights reserved
AD Architecture
SAML IdP
Authenticate Once
SSO to SAML Enabled Services© 2017 Veridium IP Ltd. All rights reserved
SAML
© 2017 Veridium IP Ltd. All rights reserved
For more information contact: Info@VeridiumID.com
Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium
QUESTIONS?
© 2017 Veridium IP Ltd. All rights reserved

More Related Content

What's hot

FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
FIDO Alliance
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
FIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
Ubisecure
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
Ubisecure
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
FIDO Alliance
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
FIDO Alliance
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
FIDO Alliance
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
FIDO Alliance
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
FIDO Alliance
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
FIDO Alliance
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
FIDO Alliance
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
FIDO Alliance
 

What's hot (20)

FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 

Similar to Eliminating Passwords with Biometrics for Identity Access Management Webinar

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
WSO2
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
ForgeRock
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
FIDO Alliance
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilecmurtagh
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilenconnolloy
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profileniamh_donovan
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profilehopster78
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
FIDO Alliance
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
AuthShield Labs
 

Similar to Eliminating Passwords with Biometrics for Identity Access Management Webinar (20)

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
Vision Id Company Profile
Vision Id Company ProfileVision Id Company Profile
Vision Id Company Profile
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Eliminating Passwords with Biometrics for Identity Access Management Webinar

  • 1. © 2017 Veridium IP Ltd. All rights reserved Eliminating Passwords with Biometrics for Identity Access Management
  • 2. Attendees have been muted You may submit questions at any time, but we will respond at the conclusion of the presentation during the Q&A session Before We Begin © 2017 Veridium IP Ltd. All rights reserved
  • 3. John Spencer Chief Product Officer • Industry expert with over 30 years of experience • Former CTO at Citrix in Northern Europe • Instrumental in delivering commercially successful and award winning products Before We Begin © 2017 Veridium IP Ltd. All rights reserved
  • 4. • The Password is Dead • Biometrics as Password Replacement • Veridium Overview • Biometric Storage Considerations • VeridiumAD • Q&A AGENDA © 2017 Veridium IP Ltd. All rights reserved
  • 5. © 2017 Veridium IP Ltd. All rights reserved Weak and compromised passwords continue to be a major attack point for hackers. The costs are high.
  • 6. © 2017 Veridium IP Ltd. All rights reserved Passwords only authorize access, while authentication is the process of verifying the claim that identity makes. Identity is the “claim” you make to access information, but making that claim with a password doesn’t prove who you are. Only biometrics – your face, your voice, your fingerprints – prove you are who you say you are. Proving Identity
  • 7. Authentication is NOT just about initial logon © 2017 Veridium IP Ltd. All rights reserved
  • 8. © 2017 Veridium IP Ltd. All rights reserved Reduce data breaches and fraudulent transactions. Replace what you know – passwords and PINs – with what you are – biometrics. With our technology, you can replace passwords altogether, or deploy biometrics as a second factor to strengthen legacy systems.
  • 9. © 2017 Veridium IP Ltd. All rights reserved V ER I D I UM OVER VIEW
  • 10. © 2017 Veridium IP Ltd. All rights reserved An end-to-end, biometrics-based authentication solution for the Enterprise.
  • 11. © 2017 Veridium IP Ltd. All rights reserved We provide all the components necessary for a complete, end-to-end biometric authentication solution that is flexible, secure, and enterprise ready. Products Overview
  • 12. © 2017 Veridium IP Ltd. All rights reserved
  • 13. WEB MOB VPN CX AD App Connectors Enroll & Authenticate Authorize & Access © 2017 Veridium IP Ltd. All rights reserved
  • 14. • Launch Authenticator Application • Enter server details & username/password • Capture Biometrics – 4 Fingers/Face on Mobile Device • SMS Notification/Email/Push with activation PIN • Activate Authenticator with PIN • Biometric template registered with server and separated • Biometrics is now exclusively used for authentication © 2017 Veridium IP Ltd. All rights reserved Enrollment – Identity Must Be Proved
  • 15. • Mobile Applications • WEB Applications – Use QR Code/Push • ‘In’ Application – Push • VPN Appliances – Push • RADIUS – Push • Citrix StoreFront and Netscaler – QR/Push • Active Directory – QR/Push © 2017 Veridium IP Ltd. All rights reserved Application Authentication
  • 16. • Attempt logon to application/service (username) • Either scan QR code on device or push notification sent • Validate Biometrics – 4 Fingers/Face • Biometrics verified on VeridiumID server or local device • Secure Token sent to service to authorize user • User is securely authenticated into application/service © 2017 Veridium IP Ltd. All rights reserved Application Authentication
  • 17. © 2017 Veridium IP Ltd. All rights reserved BI OMET R I C S TOR AGE
  • 18. Securing biometric data is paramount. A breach of your system would expose a full set of biometric user data. Biometric data is for life, it cannot be reset. © 2017 Veridium IP Ltd. All rights reserved Biometric Storage
  • 19. Our Distributed Data Model is a multi-part process that covers the encryption and storage of the biometric vector. First, the captured biometric is encrypted with Visual Cryptography. This allows us to encrypt the vector randomly into two separate pieces. Then, one is stored on the mobile device and the other on the VeridiumID server for maximum security. © 2017 Veridium IP Ltd. All rights reserved Distributed Data
  • 20. © 2017 Veridium IP Ltd. All rights reserved
  • 21. © 2017 Veridium IP Ltd. All rights reserved
  • 22. © 2017 Veridium IP Ltd. All rights reserved • Is significantly more reliable than other mobile solutions • Increases complexity of data collected, enhancing security • Does not require additional hardware above 5MP camera + flash 4 Fingers TouchlessID:
  • 23. © 2017 Veridium IP Ltd. All rights reserved • False rejection rate (FRR) is as low as 1.4% which means 98% success rate, regardless of external conditions. 4 Fingers requires no external hardware. • We just require a 5MP camera and LED flash. • 4 Fingers is one of the most secure biometrics available. • More secure than Face and TouchID and Voice 4 Fingers is reliable in any environment
  • 24. 4 Fingers captured print 4 Fingers processed print Traditional Fingerprint Scanner Minutiae vector The contactless and contact prints are of comparable quality. The minutia match. Print Quality © 2017 Veridium IP Ltd. All rights reserved
  • 25. © 2017 Veridium IP Ltd. All rights reserved L I V EN ES S
  • 26. © 2017 Veridium IP Ltd. All rights reserved Is it Real or Fake?
  • 27. © 2017 Veridium IP Ltd. All rights reserved
  • 28. Verify the identity claimed by any user, keeping your enterprise data safer and more secure. Use biometric authentication on desktops (including VDI) and laptops using 4F, Touch or Facial eliminate Active Directory passwords entirely VeridiumAD also supports offline scenarios. © 2017 Veridium IP Ltd. All rights reserved
  • 29. 1. Replace passwords, use Biometrics as primary or secondary authentication. 2. To log on, user selects their Active Directory account and clicks “Login.” 3. Use authenticates with face recognition from desktop camera or using Mobile device as the authenticator 4. Once verified, user is logged on and can access their Windows applications and data. © 2017 Veridium IP Ltd. All rights reserved Active Directory
  • 30. Custom Credential Provider © 2017 Veridium IP Ltd. All rights reserved
  • 31. Enrollment Proxy Registration Authority VeridiumID Domain Controllers Certificate Services © 2017 Veridium IP Ltd. All rights reserved AD Architecture
  • 32. SAML IdP Authenticate Once SSO to SAML Enabled Services© 2017 Veridium IP Ltd. All rights reserved SAML
  • 33. © 2017 Veridium IP Ltd. All rights reserved
  • 34. For more information contact: Info@VeridiumID.com Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium QUESTIONS? © 2017 Veridium IP Ltd. All rights reserved