SlideShare a Scribd company logo
Entrust IdentityGuard Mobile
Mobile Solutions for Greater Authentication Security                                  Product Benefits
As mobile devices continue to expand in capability and popularity, they present       • Enables strong mobile authentication
                                                                                        with out-of-band transaction
tremendous opportunities for consumers and enterprises alike. This shift to more        confirmation
mobile-centric environments spans consumer-based activities like mobile banking       • Leverages mobile devices to boost
or smartphone transactions, as well as more enterprise-specific tasks such as email     authentication strength without
communication, secure VPN, and physical, logical and mobile access.                     inconvenience
                                                                                      • Provides soft token authentication for
Financial Institutions Fight Fraud                                                      customer or enterprise environments
While there are many safeguards deployed inside financial institutions today,         • Transforms today’s popular smartphones
                                                                                        into mobile credentials
criminals are increasingly turning to highly effective social engineering tactics,
combined with stealthy malware, to illegally obtain consumer identities.              • Includes standards-based (OATH)
                                                                                        authentication and signature
To combat these attacks, Entrust IdentityGuard Mobile provides three tools
                                                                                      • Support for leading mobile platforms
that help organizations stop many types of online and mobile fraud threats.             including Apple iOS, RIM BlackBerry,
                                                                                        Google Android and Microsoft Windows
• Mobile One-Time-Passcode Tokens                                                       Mobile (6.0-6.5)
  Entrust enables organizations to transform smartphones into convenient, secure      • Customizable to include organization-
  one-time-passcode (OTP) tokens, leveraging devices that are widely deployed,          specific branding for increased user
  to provide convenient security for online banking. Organizations can also brand       acceptance
  these soft tokens for better customer or employee recognition. And this is a
  proven method that helps defend against today’s advanced malware, like
  man-in-the-browser attacks.

• Out-of-Band Verification
  Entrust’s mobile application provides out-of-band notification of transaction
  details as part of the authentication process, and enables users to confirm the
  legitimacy of transactions. Entrust IdentityGuard also includes the ability to
  store and refer to transaction history.

• Transparent Strong Authentication
  Entrust's easy-to-use software development kit (SDK) helps organizations embed
  transparent strong authentication right into their own mobile application. This
  provides transparent security for consumers using mobile banking, while enabling
  organizations to enhance security for the online channel.

  And embedding OTP technology in a mobile device is more cost-effective than
  purchasing, issuing and deploying hardware tokens because it leverages devices
  that are already widely deployed — increasing user acceptance.
Mobile Devices Improve Enterprise Security                                 Through the Entrust IdentityGuard platform, organizations
Much like the approach to securing mobile-banking                          may even transform end-user smartphones into true
customers, affordable solutions are available to secure                     mobile credentials. Further convenience is realized for
mobile devices that interact or gain access to corporate                   physical and logical access with the support of the latest
environments. But enterprises face a different set of                       industry standards including near-field communication
challenges with mobile devices co-existing within secure                   (NFC) and Bluetooth.
corporate infrastructures.
                                                                           Stronger Authentication via Mobile Devices
The use of mobile soft tokens — primarily to enable                        Entrust provides mobile security capabilities via distinct
strong authentication to enterprise networks, applications                 solution areas — mobile authentication, transaction
and resources — dramatically improves enterprise security.                 verification, mobile smart credentials, and transparent
Not only are they simple to use and deploy, they increase                  authentication technology with an advanced software
end-user adoption and promote cost-savings by removing                     development kit (SDK).
the need to issue expensive hardware tokens.
                                                                           In addition to enabling strong authentication with a
                                                                           software-based OTP token, Entrust IdentityGuard also
                                                                           strongly authenticates online transactions, taking into
                                                                           consideration the details of that specific transaction.

Entrust IdentityGuard Mobile

                                                      User logs in to the online application. This will often
                        Login
  1                                                   include transparent forms of authentication beyond
                                                      username and password (e.g., device authentication).




                       Transfer                       User decides to undertake a more risky transaction;
  2                    $32,150                        a large money transfer or adding a new bill payee,
                                                      for example.




                                                      The bank displays a Web confirmation screen to
  3                                                   the user and also sends the transaction information
                                                      directly to Entrust IdentityGuard Mobile.

                                                      Entrust IdentityGuard Mobile automatically alerts
                                                      the user that they have a waiting transaction.
                                                      The user compares the details of the transaction and,
                                                      if correct, types the generated confirmation code into
                                                      the Web application to complete the action.

Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
Advantages                                                       Portable
Simple Soft Tokens                                               Use the most popular mobile platforms to boost
Transform smartphones into convenient, secure                    authentication strength by not requiring the user to
one-time-passcode (OTP) tokens. This approach has a high         carry an extra hardware device or have access to a
user-adoption rate and can include organizations-specific        specific computer.
branding for better customer or employee recognition.
                                                                 Flexible
Mobile Smart Credentials                                         Supports the use of both simple time-based OTP as well
Entrust adds smart credential capabilities to mobile devices     as out-of-band transaction signatures. Also supports
for physical and logical access, but also provides smartcard-    multiple identities within the same application, enabling
based security for desktops and laptops without native           organizations to fully leverage the deployed application
smartcard readers.                                               (e.g., a banking ID as well as a corporate remote access ID).

Beat MITB                                                        Broad Platform Support
One of the only mobile authentication solution on                Supports the leading mobile platforms on the
the market today that helps defeat advanced malware,             market today, including Apple iOS, RIM BlackBerry,
including man-in-the-browser attacks. Key to interoperability,   Google Android and Microsoft Windows Mobile (6.0-6.5).
it leverages proven time-based, OATH-compliant OTP
authentication and out-of-band transaction verification          Standards-Compliant
on leading mobile devices.                                       Uses the OATH standard for time-based, one-time-
                                                                 passcode and transaction signature generation.
Easy to Use
Enables out-of-band transaction verification,                    Customizable
OATH-compliant signatures and even a method to                   Includes the ability to add organization-specific branding
immediately report suspicions account behavior.                  to each identity, improving usability and reinforcing brand
The end-user isn't forced to enter any data within the           image.
smartphone application, only a straightforward Web
confirmation code to complete the transaction online.            For Developers
                                                                 Entrust's easy-to-use SDK helps organizations embed
Enterprise Mobility                                              transparent and strong authentication right into their
Entrust provides the only authentication platform that fully     own mobile applications.
enables today’s leading mobile platforms for real-world
business use. Entrust’s mobile capabilities make it easy for
end-users to enroll their mobile devices for device
certificate issuance. And advanced mobile smart
credentials can be used with Bluetooth and NFC
technology for even greater convenience.

Easy Integration
Entrust’s open API architecture allows for tight integration
with today's leading mobile device management (MDM),
identity access management (IAM) and public key
infrastructure (PKI) vendors. This enables Entrust
IdentityGuard to work with new and existing enterprise
implementations, plus adds the ability to integrate in-
house or managed service-based digital certificates.
Entrust & You                                                                                      Company Facts
More than ever, Entrust understands your organization’s                                            Website: www.entrust.com
security pain points. Whether it’s the protection of                                               Employees: 359
information, securing online customers, regulatory                                                 Customers: 5,000
compliance or large-scale government projects, Entrust                                             Offices: 10 globally
provides identity-based security solutions that are not
only proven in real-world environments, but cost-effective                                          Headquarters
in today’s uncertain economic climate.                                                             One Lincoln Centre
                                                                                                   5400 LBJ Freeway, Suite 1340
The smart choice for properly securing digital identities                                          Dallas, Texas 75240 USA
and information, Entrust solutions represent the right
balance between affordability, expertise and service. For                                           Sales
more information on Entrust IdentityGuard Mobile, contact                                          North America: 1-888-690-2424
the Entrust representative in your area at 888-690-2424 or                                         EMEA: +44 (0) 118 953 3000
visit entrust.com/mobile.                                                                          Email: entrust@entrust.com




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations
spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain
points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust
products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product
names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks
or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved.
                                                                                                                                                                                    24003/4-12

More Related Content

What's hot

Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
lfilliat
 
test
testtest
test
pixeldemo
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
Neil Costigan
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
Entrust Datacard
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
Salvatore D'Agostino
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
Entrust Datacard
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
OKsystem
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
USAID CEED II Project Moldova
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
VASCO Data Security
 
Currency
CurrencyCurrency
Currency
Bilcareltd
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
2FA, Inc.
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 

What's hot (17)

Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
test
testtest
test
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Currency
CurrencyCurrency
Currency
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 

Viewers also liked

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
Entrust Datacard
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
Entrust Datacard
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
Entrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Entrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Entrust Datacard
 

Viewers also liked (6)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 

Similar to Entrust IdentityGuard Mobile

Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
Chetan Kapila
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
CA API Management
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
pjpallen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
kate_holden
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
greatdaniel
 
status
statusstatus
status
pixeldemo
 
status
statusstatus
status
pixeldemo
 
ffv
ffvffv
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
Ubisecure
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
Rajat Jain
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
Srivatsan Srinivasan
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
PortalGuard
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
M2SYS Technology
 

Similar to Entrust IdentityGuard Mobile (20)

Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
status
statusstatus
status
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Entrust IdentityGuard Mobile

  • 1. Entrust IdentityGuard Mobile Mobile Solutions for Greater Authentication Security Product Benefits As mobile devices continue to expand in capability and popularity, they present • Enables strong mobile authentication with out-of-band transaction tremendous opportunities for consumers and enterprises alike. This shift to more confirmation mobile-centric environments spans consumer-based activities like mobile banking • Leverages mobile devices to boost or smartphone transactions, as well as more enterprise-specific tasks such as email authentication strength without communication, secure VPN, and physical, logical and mobile access. inconvenience • Provides soft token authentication for Financial Institutions Fight Fraud customer or enterprise environments While there are many safeguards deployed inside financial institutions today, • Transforms today’s popular smartphones into mobile credentials criminals are increasingly turning to highly effective social engineering tactics, combined with stealthy malware, to illegally obtain consumer identities. • Includes standards-based (OATH) authentication and signature To combat these attacks, Entrust IdentityGuard Mobile provides three tools • Support for leading mobile platforms that help organizations stop many types of online and mobile fraud threats. including Apple iOS, RIM BlackBerry, Google Android and Microsoft Windows • Mobile One-Time-Passcode Tokens Mobile (6.0-6.5) Entrust enables organizations to transform smartphones into convenient, secure • Customizable to include organization- one-time-passcode (OTP) tokens, leveraging devices that are widely deployed, specific branding for increased user to provide convenient security for online banking. Organizations can also brand acceptance these soft tokens for better customer or employee recognition. And this is a proven method that helps defend against today’s advanced malware, like man-in-the-browser attacks. • Out-of-Band Verification Entrust’s mobile application provides out-of-band notification of transaction details as part of the authentication process, and enables users to confirm the legitimacy of transactions. Entrust IdentityGuard also includes the ability to store and refer to transaction history. • Transparent Strong Authentication Entrust's easy-to-use software development kit (SDK) helps organizations embed transparent strong authentication right into their own mobile application. This provides transparent security for consumers using mobile banking, while enabling organizations to enhance security for the online channel. And embedding OTP technology in a mobile device is more cost-effective than purchasing, issuing and deploying hardware tokens because it leverages devices that are already widely deployed — increasing user acceptance.
  • 2. Mobile Devices Improve Enterprise Security Through the Entrust IdentityGuard platform, organizations Much like the approach to securing mobile-banking may even transform end-user smartphones into true customers, affordable solutions are available to secure mobile credentials. Further convenience is realized for mobile devices that interact or gain access to corporate physical and logical access with the support of the latest environments. But enterprises face a different set of industry standards including near-field communication challenges with mobile devices co-existing within secure (NFC) and Bluetooth. corporate infrastructures. Stronger Authentication via Mobile Devices The use of mobile soft tokens — primarily to enable Entrust provides mobile security capabilities via distinct strong authentication to enterprise networks, applications solution areas — mobile authentication, transaction and resources — dramatically improves enterprise security. verification, mobile smart credentials, and transparent Not only are they simple to use and deploy, they increase authentication technology with an advanced software end-user adoption and promote cost-savings by removing development kit (SDK). the need to issue expensive hardware tokens. In addition to enabling strong authentication with a software-based OTP token, Entrust IdentityGuard also strongly authenticates online transactions, taking into consideration the details of that specific transaction. Entrust IdentityGuard Mobile User logs in to the online application. This will often Login 1 include transparent forms of authentication beyond username and password (e.g., device authentication). Transfer User decides to undertake a more risky transaction; 2 $32,150 a large money transfer or adding a new bill payee, for example. The bank displays a Web confirmation screen to 3 the user and also sends the transaction information directly to Entrust IdentityGuard Mobile. Entrust IdentityGuard Mobile automatically alerts the user that they have a waiting transaction. The user compares the details of the transaction and, if correct, types the generated confirmation code into the Web application to complete the action. Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
  • 3. Advantages Portable Simple Soft Tokens Use the most popular mobile platforms to boost Transform smartphones into convenient, secure authentication strength by not requiring the user to one-time-passcode (OTP) tokens. This approach has a high carry an extra hardware device or have access to a user-adoption rate and can include organizations-specific specific computer. branding for better customer or employee recognition. Flexible Mobile Smart Credentials Supports the use of both simple time-based OTP as well Entrust adds smart credential capabilities to mobile devices as out-of-band transaction signatures. Also supports for physical and logical access, but also provides smartcard- multiple identities within the same application, enabling based security for desktops and laptops without native organizations to fully leverage the deployed application smartcard readers. (e.g., a banking ID as well as a corporate remote access ID). Beat MITB Broad Platform Support One of the only mobile authentication solution on Supports the leading mobile platforms on the the market today that helps defeat advanced malware, market today, including Apple iOS, RIM BlackBerry, including man-in-the-browser attacks. Key to interoperability, Google Android and Microsoft Windows Mobile (6.0-6.5). it leverages proven time-based, OATH-compliant OTP authentication and out-of-band transaction verification Standards-Compliant on leading mobile devices. Uses the OATH standard for time-based, one-time- passcode and transaction signature generation. Easy to Use Enables out-of-band transaction verification, Customizable OATH-compliant signatures and even a method to Includes the ability to add organization-specific branding immediately report suspicions account behavior. to each identity, improving usability and reinforcing brand The end-user isn't forced to enter any data within the image. smartphone application, only a straightforward Web confirmation code to complete the transaction online. For Developers Entrust's easy-to-use SDK helps organizations embed Enterprise Mobility transparent and strong authentication right into their Entrust provides the only authentication platform that fully own mobile applications. enables today’s leading mobile platforms for real-world business use. Entrust’s mobile capabilities make it easy for end-users to enroll their mobile devices for device certificate issuance. And advanced mobile smart credentials can be used with Bluetooth and NFC technology for even greater convenience. Easy Integration Entrust’s open API architecture allows for tight integration with today's leading mobile device management (MDM), identity access management (IAM) and public key infrastructure (PKI) vendors. This enables Entrust IdentityGuard to work with new and existing enterprise implementations, plus adds the ability to integrate in- house or managed service-based digital certificates.
  • 4. Entrust & You Company Facts More than ever, Entrust understands your organization’s Website: www.entrust.com security pain points. Whether it’s the protection of Employees: 359 information, securing online customers, regulatory Customers: 5,000 compliance or large-scale government projects, Entrust Offices: 10 globally provides identity-based security solutions that are not only proven in real-world environments, but cost-effective Headquarters in today’s uncertain economic climate. One Lincoln Centre 5400 LBJ Freeway, Suite 1340 The smart choice for properly securing digital identities Dallas, Texas 75240 USA and information, Entrust solutions represent the right balance between affordability, expertise and service. For Sales more information on Entrust IdentityGuard Mobile, contact North America: 1-888-690-2424 the Entrust representative in your area at 888-690-2424 or EMEA: +44 (0) 118 953 3000 visit entrust.com/mobile. Email: entrust@entrust.com About Entrust A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved. 24003/4-12