SlideShare a Scribd company logo
1 of 1
Download to read offline
Identity Cues Two Factor™ & Two Way Authentication
Maximum Security with Maximum Convenience
“Sometimes the easiest answers are the best.”
John Dix, Editor-in-Chief of Network World, describing Identity Cues
Green Armor Solutions Inc. ◊ +1 (201) 801-0383 ◊ www.greenarmor.com ◊ info@greenarmor.com
© 2006 Green Armor Solutions, Inc. Green Armor Solutions, Green Armor, Identity Cues, Identity Cues Two Factor, the Green Armor Solutions logo, and the slogan “Maximum Security with Maximum
Convenience” are trademarks of Green Armor Solutions, Inc. All Rights Reserved.
TM
Maximum Security
True Two-Factor Authentication - Identity
Cues Two Factor delivers true two-factor
authentication. It never relies on users answering
questions (whose answers can often be obtained
by criminals) in lieu of a two-factor sign on.
Protection against Man-In-the-Middle Attacks
Unlike other two-factor authentication systems,
Identity Cues Two Factor protects against man-in-
the-middle attacks – using dual defenses.
Two-Way (Mutual) Authentication - A unique
combination of technology and psychology
proactively informs users whether or not a website
is legitimate. Visual cues are optimized per the
human recognition process in order to ensure
maximum effectiveness.
Maximum Convenience
Easiest two-factor authentication for users -
Identity Cues Two Factor requires no user
enrollment, no software downloads, no secrets to
be remembered, no devices to be carried, and no
extra steps to be endured during login.
Support for Numerous Web Environments
Identity Cues Two Factor runs on numerous
platforms, easily scales to meet the needs of
organizations of all sizes, and requires little
ongoing maintenance.
Identity Cues Two Factor is a unique, user-friendly authentication system that both strongly authenticates
users to an online system as well as informs users whether they are interacting with a legitimate web site or
with a criminal’s clone site. As the most user-friendly two-factor (and two-way) authentication system
available today, Identity Cues Two Factor typically requires no user enrollment, no extra steps during the login
process, no devices to be carried, no user training, and little ongoing maintenance.
Authentication using passwords or “secret” answers to questions poses serious risks — if an unauthorized party obtains a
password or answer he can gain inappropriate access to sensitive resources. Two-factor authentication – in which users
must possess a physical device in addition to knowing a password – is a far more secure. In fact, the Federal Financial
Institutions Examination Council (FFIEC) has instructed US-based financial institutions to implement two-factor
authentication for all online account access.
But, two-factor authentication can be inconvenient for users. It also does not adequately address the issue of phishing, and
is usually vulnerable to man-in-the-middle attacks (such as those recently leveraged by criminals to successfully breach
financial institutions that use two-factor authentication). With phishing costing
American businesses over $1-billion annually, and with targeted corporate phishing
(also known as spear phishing) causing significant breaches of sensitive corporate
information, two-way authentication – in which systems prove their identity to
users – is crucial.
Identity Cues Two Factor exceeds FFIEC guidelines and delivers both two-
way and two-factor authentication in the most user-friendly fashion.
Simple: Identity Cues
Two Factor is delivered as
software that easily
integrates with existing
web sites. True two factor
authentication takes place behind the scenes, and obvious cues
enable all users to instinctively recognize whether or not they are
interacting with an intended legitimate business.
Effective: Identity Cues Two Factor delivers true two-factor and
two-way security without requiring users to make a conscious
decision as to whether they are accessing a legitimate website.
Psychology leveraged in the design helps ensure effectiveness
even when users do not pay attention to visual cues.
Secure: Patent-pending technology authenticates users as well as
the computers they use for access. Users type their login names &
passwords as they always have – with no added steps. When a
user accesses from an unknown machine a one-time password is
required for access; the one-time password can be sent to the user
via an email message, an SMS to his cellphone, or generated by a
third-party product such as a hardware token.
Identity Cues Two Factor generates visual cues to prove the
veracity of websites; cues are generated by applying one-way
cryptographic functions to user-entered text and a series of secret
keys. Only the genuine site can generate the proper cue for any
particular user; if no cue or an incorrect cue is displayed, it will be
obvious to even an untrained user – and even to users not paying
attention – that something is wrong with the site.
Identity Cues Two Factor also offers double protection against
man-in-the-middle attacks, cueing users when a site is legitimate,
and warning them when it is not.

More Related Content

What's hot

Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...Cognizant
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web SecurityDragos Lungu
 
Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
SSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsSSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsMohammad Shahnewaz
 

What's hot (20)

Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
3 d
3 d3 d
3 d
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Internet Security Agent
Internet Security AgentInternet Security Agent
Internet Security Agent
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
SSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizationsSSO - single sign on solution for banks and financial organizations
SSO - single sign on solution for banks and financial organizations
 

Viewers also liked

Dane osobowe w data center
Dane osobowe w data centerDane osobowe w data center
Dane osobowe w data centerAgata Kowalska
 
Sugammadeks wskazania do_stosowania
Sugammadeks wskazania do_stosowaniaSugammadeks wskazania do_stosowania
Sugammadeks wskazania do_stosowaniaPolanest
 
Ochrona środowiska
Ochrona środowiskaOchrona środowiska
Ochrona środowiskaPZM
 
Procesos tecnicos que se realizan en la creacion de un hardware
Procesos tecnicos que se realizan en la creacion de un hardwareProcesos tecnicos que se realizan en la creacion de un hardware
Procesos tecnicos que se realizan en la creacion de un hardwareFabianBC20
 
Rewalidacja 1 & (2)
Rewalidacja 1 & (2)Rewalidacja 1 & (2)
Rewalidacja 1 & (2)Aga Szajda
 
Metodologia nauk cz1 15_16
Metodologia nauk cz1 15_16Metodologia nauk cz1 15_16
Metodologia nauk cz1 15_16Sabina Cisek
 

Viewers also liked (8)

Chorwacja
ChorwacjaChorwacja
Chorwacja
 
Dane osobowe w data center
Dane osobowe w data centerDane osobowe w data center
Dane osobowe w data center
 
9
99
9
 
Sugammadeks wskazania do_stosowania
Sugammadeks wskazania do_stosowaniaSugammadeks wskazania do_stosowania
Sugammadeks wskazania do_stosowania
 
Ochrona środowiska
Ochrona środowiskaOchrona środowiska
Ochrona środowiska
 
Procesos tecnicos que se realizan en la creacion de un hardware
Procesos tecnicos que se realizan en la creacion de un hardwareProcesos tecnicos que se realizan en la creacion de un hardware
Procesos tecnicos que se realizan en la creacion de un hardware
 
Rewalidacja 1 & (2)
Rewalidacja 1 & (2)Rewalidacja 1 & (2)
Rewalidacja 1 & (2)
 
Metodologia nauk cz1 15_16
Metodologia nauk cz1 15_16Metodologia nauk cz1 15_16
Metodologia nauk cz1 15_16
 

Similar to Identity cues two factor data sheet

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsdeorwine infotech
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVWhat is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVSaqifKhan3
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 

Similar to Identity cues two factor data sheet (20)

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Evolution of MFA.pptx
Evolution of MFA.pptxEvolution of MFA.pptx
Evolution of MFA.pptx
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
120 i143
120 i143120 i143
120 i143
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVWhat is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 

More from Hai Nguyen

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 

More from Hai Nguyen (20)

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 

Identity cues two factor data sheet

  • 1. Identity Cues Two Factor™ & Two Way Authentication Maximum Security with Maximum Convenience “Sometimes the easiest answers are the best.” John Dix, Editor-in-Chief of Network World, describing Identity Cues Green Armor Solutions Inc. ◊ +1 (201) 801-0383 ◊ www.greenarmor.com ◊ info@greenarmor.com © 2006 Green Armor Solutions, Inc. Green Armor Solutions, Green Armor, Identity Cues, Identity Cues Two Factor, the Green Armor Solutions logo, and the slogan “Maximum Security with Maximum Convenience” are trademarks of Green Armor Solutions, Inc. All Rights Reserved. TM Maximum Security True Two-Factor Authentication - Identity Cues Two Factor delivers true two-factor authentication. It never relies on users answering questions (whose answers can often be obtained by criminals) in lieu of a two-factor sign on. Protection against Man-In-the-Middle Attacks Unlike other two-factor authentication systems, Identity Cues Two Factor protects against man-in- the-middle attacks – using dual defenses. Two-Way (Mutual) Authentication - A unique combination of technology and psychology proactively informs users whether or not a website is legitimate. Visual cues are optimized per the human recognition process in order to ensure maximum effectiveness. Maximum Convenience Easiest two-factor authentication for users - Identity Cues Two Factor requires no user enrollment, no software downloads, no secrets to be remembered, no devices to be carried, and no extra steps to be endured during login. Support for Numerous Web Environments Identity Cues Two Factor runs on numerous platforms, easily scales to meet the needs of organizations of all sizes, and requires little ongoing maintenance. Identity Cues Two Factor is a unique, user-friendly authentication system that both strongly authenticates users to an online system as well as informs users whether they are interacting with a legitimate web site or with a criminal’s clone site. As the most user-friendly two-factor (and two-way) authentication system available today, Identity Cues Two Factor typically requires no user enrollment, no extra steps during the login process, no devices to be carried, no user training, and little ongoing maintenance. Authentication using passwords or “secret” answers to questions poses serious risks — if an unauthorized party obtains a password or answer he can gain inappropriate access to sensitive resources. Two-factor authentication – in which users must possess a physical device in addition to knowing a password – is a far more secure. In fact, the Federal Financial Institutions Examination Council (FFIEC) has instructed US-based financial institutions to implement two-factor authentication for all online account access. But, two-factor authentication can be inconvenient for users. It also does not adequately address the issue of phishing, and is usually vulnerable to man-in-the-middle attacks (such as those recently leveraged by criminals to successfully breach financial institutions that use two-factor authentication). With phishing costing American businesses over $1-billion annually, and with targeted corporate phishing (also known as spear phishing) causing significant breaches of sensitive corporate information, two-way authentication – in which systems prove their identity to users – is crucial. Identity Cues Two Factor exceeds FFIEC guidelines and delivers both two- way and two-factor authentication in the most user-friendly fashion. Simple: Identity Cues Two Factor is delivered as software that easily integrates with existing web sites. True two factor authentication takes place behind the scenes, and obvious cues enable all users to instinctively recognize whether or not they are interacting with an intended legitimate business. Effective: Identity Cues Two Factor delivers true two-factor and two-way security without requiring users to make a conscious decision as to whether they are accessing a legitimate website. Psychology leveraged in the design helps ensure effectiveness even when users do not pay attention to visual cues. Secure: Patent-pending technology authenticates users as well as the computers they use for access. Users type their login names & passwords as they always have – with no added steps. When a user accesses from an unknown machine a one-time password is required for access; the one-time password can be sent to the user via an email message, an SMS to his cellphone, or generated by a third-party product such as a hardware token. Identity Cues Two Factor generates visual cues to prove the veracity of websites; cues are generated by applying one-way cryptographic functions to user-entered text and a series of secret keys. Only the genuine site can generate the proper cue for any particular user; if no cue or an incorrect cue is displayed, it will be obvious to even an untrained user – and even to users not paying attention – that something is wrong with the site. Identity Cues Two Factor also offers double protection against man-in-the-middle attacks, cueing users when a site is legitimate, and warning them when it is not.