SlideShare a Scribd company logo
1 of 26
TekMonks
LoginCat Security Software
1
2
Introduction
Today’s Security Challenges
Issues with current solutions
LoginCat: Secure by Design
LoginCat Security – On Premise and Cloud
Summary
Agenda
• Technology is all about Skills, Service and Solutions – Your vendor
should be the same. TekMonks is –
• A full service, fast growing, and highly skilled technology firm.
• Global – with operations across 6 countries, and 3 continents.
• Experience in multiple industry verticals – including Government,
Finance, Health, and Transportation.
TekMonks – Skills, Service and Solutions
3
4
Key Theme
Security Challenges and Solutions
• Cybersecurity is one of the major challenges for any major organization
today.
• Most hackers these days are from well funded groups, and
well trained in being able to hack various computer systems.
• Firewalls, VPNs, and Edge security devices and protect internal networks
from intruders.
• But what happens when they are breached? When the hacker is now
inside your network?
Cybersecurity Challenges
5
• The continued, high frequency of successful cyberattacks against today’s
enterprises has made it abundantly clear that traditional,
perimeter-centric security strategies are no longer effective.
• Zero Trust – The model that says we can’t assume our internal
network is not breached. Exact same model applies to cloud, of course.
• External Hackers & Internal Hackers - All the same. All it takes is an external
hacker to install malware on an employee’s laptop or phone to get access to
internal systems, as an internal hacker.
• If a hacker is inside then it is much easier for him or her to crack passwords
and logins for internal applications.
Zero Trust
6
• Traditional Zero Trust model – we will provide access to internal
applications only on a as-needed basis and enforce. So only
authorized users will have access.
• This is common sense but what prevents someone who has
already hacked one ID to hack another one, specially now that
he is inside the trusted environment? He can become the trusted user, to
access sensitive applications.
• True Zero Trust – Assume there is an unwanted hacker with access, trying to
crack into internal applications, fight him pro-actively, instead of depending
on passive measures. This is what LoginCat does.
7
Zero Trust
• Various strategies to crack passwords
• Keyloggers – when they work are the easiest
• Rainbow tables – Hack passwords as a service
• http://project-rainbowcrack.com/table.htm
• 6 TB of Rainbow tables ; can crack all characters on keyboard
• John the Ripper - http://www.openwall.com/john/
• GPU based cracking - much faster than using CPUs, using massive
parallelization - a home built GPU cluster can crack every Windows
password in less than 6 hours. http://goo.gl/mU5EFB
8
Just how easy are passwords to hack?
• Crackers today are really efficient at breaking passwords.
• Deep Blue Supercomputer - around 1999 - beat Garry Kasparov - 11.38 GFLOPS.
• Samsung Galaxy S7 with SnapDragon 820 packs 498.5 GFLOPS. Your Samsung
Smartphone is approximately 44 times faster than the Deep Blue
Supercomputer.
• On Desktop Radeon R9 Fury X2 = 17,204 GLOPS. 1,511 times faster than Deep
Blue.
• Hackers routinely build rigs with up to 25 of these GPUs, which is 430 TeraFLOPS.
https://goo.gl/1nVst6. This is same power as Blue Gene Supercomputer at
Livermore Nuclear Laboratory to simulate nuclear reactions.
• If one thinks passwords are secure because hashing will take a lot of computing
power – one is not living in the reality of 2016.
9
Just how easy are passwords to hack?
10
Password Cracking Rigs
• Biometric and Thumb? Every thing you touch will now contain your password.
This is one of the easiest "security measures" to break. There are at least 7
different currently known ways to defeat this. For example, hackers have shown
simple inkjets can be used to defeat fingerprint based authentication.
• Iris Scanning? Megapixel cameras can steal your Iris patterns.
• Facial Identification? Face masks take care of defeating this security measure.
• Token / RSA? No longer secure. Quantum computers can hack it very easily. US
Government has already abandoned it. MIT has already developed a Quantum
Computer capable of easily hacking RSA.
Issues with other technologies
11
• First we eliminates passwords. We use Patented passphrase technology which is
many magnitudes safer.
• Pass phrase based authentication – Mathematically proven to be extremely hard
to hack, even with today’s computing speeds.
• We eliminates User IDs as well. No hack targets, zero exposure, zero trust.
• Assume hackers are already active – Built in zero trust based identity manager -
secures existing internal applications and cloud applications against hacking, by
proactively controlling and managing their passwords.
• Deep algorithm based edge security – stops hackers from even trying to attempt a
hack.
• Quantum computing resistant – No use of asymmetric keys which are easily
hacked by Quantum computers.
LoginCat Security – Summary First
12
13
LoginCat
Security Software and Appliances
As the processing speed of computers has increased, passwords are notoriously
easy to hack. 8 character passwords take 15 hours at most to hack these days.
Secure by design – End of Passwords
14
LoginCat exclusively uses pass phrases instead of passwords. Pass phrases are next
to impossible to crack, even with the fastest computers today and tomorrow!
Secure by design – Pass Phrases
15
• Most attempts to hack a User ID start with – knowing a User ID.
• A User ID is like painting a target sign on your back. Hackers gain access
to accounts by repeatedly trying to guess the password for a given User
ID.
• LoginCat eliminates using User ID for logins. This significantly reduces the
area of attack for hackers. There is no target anymore to guess passwords
against.
• Specific user accounts can no longer be targeted for hacking attacks.
Secure by design – End of User ID
16
• LoginCat Manages the User’s Identity across all connected applications.
• For internal and external applications LoginCat will automatically, and frequently change
the associated login credentials (passwords) for example every 4 hours. LoginCat will
automatically generate the toughest passwords possible. This makes it harder to hack the
accounts, while creating a constantly moving target for the hackers.
• LoginCat comes with a built in SSO solution which works across all major Cloud and in-
house applications. Users no longer need to be aware of their constantly changing
passwords, since LoginCat will log them into the end systems.
• When an application is hacked, LoginCat will either lock out the attackers automatically by
changing the credentials – or detect the hack (if the hacker has locked the account) –
either way preventing damages. The only solution designed to assume hackers are inside.
Secure by design – Password Management
17
• Edge of network security features – both in cloud and appliance form
factors.
• Deep security algorithms – beyond IP firewalls.
LoginCat will analyze incoming login attempts
and ban hackers using AI algorithms.
• Example Algorithms
• Multiple incorrect attempts from same IP
• Pattern analysis of incoming request headers to ban distributed attacks, for example same
request headers from multiple IPs, which are unsuccessful in login, will trigger off the
DDoS attack prevention monitor.
• Successful login from unknown locations, or locations that don’t match mobile devices.
Secure by design – Edge of network AI based hack detection
18
• All current security token based solutions are prone to Quantum attacks. This is
because technologies like RSA etc. are based on
factorization problems which Quantum computers
can easily solve.
• US Government already requires all authentication
methods to be Quantum resistant as it is believed
that some government based agencies already
have Quantum capabilities.
http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf
• Both the single and two factor authentication methods used in LoginCat are resistant
to being hacked by Quantum computers – as we don’t use Token based
authentication schemes. We are safe today – and ready for tomorrow!
Secure by design – Resistant to Quantum attacks
19
• LoginCat scripting based authentication adapters will work with all your
existing Web based and non-Web based applications.
• No changes needed to existing applications. Do they use MD5? SHA1? They
are already insecure – LoginCat provides the only means to make existing
applications secure and resilient, without code modification.
• We manage the passwords, change them on a daily basis, making your
existing application un-hackable, and quickly detect any hack attempts.
• Appliance or Cloud Based – bring us on premise with an appliance, or run
LoginCat via from our hosted cloud.
20
Easily integrate to your existing applications – Cloud or
Appliance
• User ID provisioning and instant locking from all internal applications, if
needed.
• Constantly updated – TekMonks will provide firmware updates to include
latest security and AI algorithms to protect against emerging threats.
• Both mobile (iOS and Android) and web based.
• Readily auditable – provides entire audit history of who logged in, when did
someone access an internal application, how long they were active, their IP,
mobile or web based access and even their location!
21
Other Benefits
22
Summary
• A secure by design solution.
• No User ID equals no easy way in. No way to target an individual.
• Pass phrases – mathematically impossible to crack.
• AI based Algorithmic security to stop hackers from even trying.
• Works will all your existing applications – Cloud or Appliance based
solution. The only affordable way to add security to existing applications.
Secure by design, from ground up
23
• Cybersecurity and cyber attacks are the top issues for any government or
corporate IT department.
• Hackers are increasingly professional, well funded and causing billions of
dollars in losses.
• LoginCat provides a secure, easily Integra table, managed environment
which is designed ground up to secure existing applications.
Can You Afford Not To?
24
Demo.
Technology and business IT assessment.
Solution proposal.
Next Steps
25
THANK YOU
26

More Related Content

What's hot

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloudPeter Wood
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10Pawel Rzepa
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team ExercisePeter Wood
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkMartin Vigo
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecuritySatnam Singh
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 RisksSantosh Satam
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 

What's hot (19)

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 

Viewers also liked

La clasificacion de las ciencias
La clasificacion de las cienciasLa clasificacion de las ciencias
La clasificacion de las cienciasEmilio Selva
 
Color assignment
Color assignment  Color assignment
Color assignment Tehreem Ali
 
Informática en la producción audiovisual
Informática en la producción audiovisualInformática en la producción audiovisual
Informática en la producción audiovisualEmily Rodriguez
 
La narrativa hispanoamericana
La narrativa hispanoamericanaLa narrativa hispanoamericana
La narrativa hispanoamericanadianamont25
 
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.k.lek Boo
 
GLIMPSE Social Media
GLIMPSE Social MediaGLIMPSE Social Media
GLIMPSE Social MediaAlexa Potocki
 
Dia de la cancion criolla
Dia de la cancion criollaDia de la cancion criolla
Dia de la cancion criollaadryal1207
 
Educación intercultural: Mapeo y diversidad cultural.
Educación intercultural: Mapeo y diversidad cultural.Educación intercultural: Mapeo y diversidad cultural.
Educación intercultural: Mapeo y diversidad cultural.Maria Clara Restrepo A
 
Advertising campaigns
Advertising campaignsAdvertising campaigns
Advertising campaignsRobbie35411
 
Claudia Spencer Resume 2016
Claudia Spencer Resume 2016Claudia Spencer Resume 2016
Claudia Spencer Resume 2016Claudia Spencer
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Metodo científico
Metodo científicoMetodo científico
Metodo científicoadryal1207
 
Método científico
Método científicoMétodo científico
Método científicodianamont25
 

Viewers also liked (20)

La clasificacion de las ciencias
La clasificacion de las cienciasLa clasificacion de las ciencias
La clasificacion de las ciencias
 
Alexis Resume[241
Alexis Resume[241Alexis Resume[241
Alexis Resume[241
 
Higiene y seguridad insdustrial
Higiene y seguridad insdustrialHigiene y seguridad insdustrial
Higiene y seguridad insdustrial
 
Color assignment
Color assignment  Color assignment
Color assignment
 
Informática en la producción audiovisual
Informática en la producción audiovisualInformática en la producción audiovisual
Informática en la producción audiovisual
 
La narrativa hispanoamericana
La narrativa hispanoamericanaLa narrativa hispanoamericana
La narrativa hispanoamericana
 
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.
ภาษาไทดำ บทเรียนมัลติมีเดีย : Multimedia Lesson on Tai Dam Language.
 
Halloween
HalloweenHalloween
Halloween
 
Virus y vacunas andres cardona
Virus y vacunas andres cardonaVirus y vacunas andres cardona
Virus y vacunas andres cardona
 
GLIMPSE Social Media
GLIMPSE Social MediaGLIMPSE Social Media
GLIMPSE Social Media
 
almisbarIEEE-1
almisbarIEEE-1almisbarIEEE-1
almisbarIEEE-1
 
Dia de la cancion criolla
Dia de la cancion criollaDia de la cancion criolla
Dia de la cancion criolla
 
Educación intercultural: Mapeo y diversidad cultural.
Educación intercultural: Mapeo y diversidad cultural.Educación intercultural: Mapeo y diversidad cultural.
Educación intercultural: Mapeo y diversidad cultural.
 
Advertising campaigns
Advertising campaignsAdvertising campaigns
Advertising campaigns
 
Claudia Spencer Resume 2016
Claudia Spencer Resume 2016Claudia Spencer Resume 2016
Claudia Spencer Resume 2016
 
Números reales
Números realesNúmeros reales
Números reales
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Metodo científico
Metodo científicoMetodo científico
Metodo científico
 
vBrian_Mendoza_CV
vBrian_Mendoza_CVvBrian_Mendoza_CV
vBrian_Mendoza_CV
 
Método científico
Método científicoMétodo científico
Método científico
 

Similar to Login cat tekmonks - v3

LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini PresentationRohit Kapoor
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Teemu Tiainen
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemRogue Wave Software
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsn|u - The Open Security Community
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdfRavi Aggarwal
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 

Similar to Login cat tekmonks - v3 (20)

LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 

Recently uploaded

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 

Recently uploaded (20)

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 

Login cat tekmonks - v3

  • 2. 2 Introduction Today’s Security Challenges Issues with current solutions LoginCat: Secure by Design LoginCat Security – On Premise and Cloud Summary Agenda
  • 3. • Technology is all about Skills, Service and Solutions – Your vendor should be the same. TekMonks is – • A full service, fast growing, and highly skilled technology firm. • Global – with operations across 6 countries, and 3 continents. • Experience in multiple industry verticals – including Government, Finance, Health, and Transportation. TekMonks – Skills, Service and Solutions 3
  • 5. • Cybersecurity is one of the major challenges for any major organization today. • Most hackers these days are from well funded groups, and well trained in being able to hack various computer systems. • Firewalls, VPNs, and Edge security devices and protect internal networks from intruders. • But what happens when they are breached? When the hacker is now inside your network? Cybersecurity Challenges 5
  • 6. • The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. • Zero Trust – The model that says we can’t assume our internal network is not breached. Exact same model applies to cloud, of course. • External Hackers & Internal Hackers - All the same. All it takes is an external hacker to install malware on an employee’s laptop or phone to get access to internal systems, as an internal hacker. • If a hacker is inside then it is much easier for him or her to crack passwords and logins for internal applications. Zero Trust 6
  • 7. • Traditional Zero Trust model – we will provide access to internal applications only on a as-needed basis and enforce. So only authorized users will have access. • This is common sense but what prevents someone who has already hacked one ID to hack another one, specially now that he is inside the trusted environment? He can become the trusted user, to access sensitive applications. • True Zero Trust – Assume there is an unwanted hacker with access, trying to crack into internal applications, fight him pro-actively, instead of depending on passive measures. This is what LoginCat does. 7 Zero Trust
  • 8. • Various strategies to crack passwords • Keyloggers – when they work are the easiest • Rainbow tables – Hack passwords as a service • http://project-rainbowcrack.com/table.htm • 6 TB of Rainbow tables ; can crack all characters on keyboard • John the Ripper - http://www.openwall.com/john/ • GPU based cracking - much faster than using CPUs, using massive parallelization - a home built GPU cluster can crack every Windows password in less than 6 hours. http://goo.gl/mU5EFB 8 Just how easy are passwords to hack?
  • 9. • Crackers today are really efficient at breaking passwords. • Deep Blue Supercomputer - around 1999 - beat Garry Kasparov - 11.38 GFLOPS. • Samsung Galaxy S7 with SnapDragon 820 packs 498.5 GFLOPS. Your Samsung Smartphone is approximately 44 times faster than the Deep Blue Supercomputer. • On Desktop Radeon R9 Fury X2 = 17,204 GLOPS. 1,511 times faster than Deep Blue. • Hackers routinely build rigs with up to 25 of these GPUs, which is 430 TeraFLOPS. https://goo.gl/1nVst6. This is same power as Blue Gene Supercomputer at Livermore Nuclear Laboratory to simulate nuclear reactions. • If one thinks passwords are secure because hashing will take a lot of computing power – one is not living in the reality of 2016. 9 Just how easy are passwords to hack?
  • 11. • Biometric and Thumb? Every thing you touch will now contain your password. This is one of the easiest "security measures" to break. There are at least 7 different currently known ways to defeat this. For example, hackers have shown simple inkjets can be used to defeat fingerprint based authentication. • Iris Scanning? Megapixel cameras can steal your Iris patterns. • Facial Identification? Face masks take care of defeating this security measure. • Token / RSA? No longer secure. Quantum computers can hack it very easily. US Government has already abandoned it. MIT has already developed a Quantum Computer capable of easily hacking RSA. Issues with other technologies 11
  • 12. • First we eliminates passwords. We use Patented passphrase technology which is many magnitudes safer. • Pass phrase based authentication – Mathematically proven to be extremely hard to hack, even with today’s computing speeds. • We eliminates User IDs as well. No hack targets, zero exposure, zero trust. • Assume hackers are already active – Built in zero trust based identity manager - secures existing internal applications and cloud applications against hacking, by proactively controlling and managing their passwords. • Deep algorithm based edge security – stops hackers from even trying to attempt a hack. • Quantum computing resistant – No use of asymmetric keys which are easily hacked by Quantum computers. LoginCat Security – Summary First 12
  • 14. As the processing speed of computers has increased, passwords are notoriously easy to hack. 8 character passwords take 15 hours at most to hack these days. Secure by design – End of Passwords 14
  • 15. LoginCat exclusively uses pass phrases instead of passwords. Pass phrases are next to impossible to crack, even with the fastest computers today and tomorrow! Secure by design – Pass Phrases 15
  • 16. • Most attempts to hack a User ID start with – knowing a User ID. • A User ID is like painting a target sign on your back. Hackers gain access to accounts by repeatedly trying to guess the password for a given User ID. • LoginCat eliminates using User ID for logins. This significantly reduces the area of attack for hackers. There is no target anymore to guess passwords against. • Specific user accounts can no longer be targeted for hacking attacks. Secure by design – End of User ID 16
  • 17. • LoginCat Manages the User’s Identity across all connected applications. • For internal and external applications LoginCat will automatically, and frequently change the associated login credentials (passwords) for example every 4 hours. LoginCat will automatically generate the toughest passwords possible. This makes it harder to hack the accounts, while creating a constantly moving target for the hackers. • LoginCat comes with a built in SSO solution which works across all major Cloud and in- house applications. Users no longer need to be aware of their constantly changing passwords, since LoginCat will log them into the end systems. • When an application is hacked, LoginCat will either lock out the attackers automatically by changing the credentials – or detect the hack (if the hacker has locked the account) – either way preventing damages. The only solution designed to assume hackers are inside. Secure by design – Password Management 17
  • 18. • Edge of network security features – both in cloud and appliance form factors. • Deep security algorithms – beyond IP firewalls. LoginCat will analyze incoming login attempts and ban hackers using AI algorithms. • Example Algorithms • Multiple incorrect attempts from same IP • Pattern analysis of incoming request headers to ban distributed attacks, for example same request headers from multiple IPs, which are unsuccessful in login, will trigger off the DDoS attack prevention monitor. • Successful login from unknown locations, or locations that don’t match mobile devices. Secure by design – Edge of network AI based hack detection 18
  • 19. • All current security token based solutions are prone to Quantum attacks. This is because technologies like RSA etc. are based on factorization problems which Quantum computers can easily solve. • US Government already requires all authentication methods to be Quantum resistant as it is believed that some government based agencies already have Quantum capabilities. http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf • Both the single and two factor authentication methods used in LoginCat are resistant to being hacked by Quantum computers – as we don’t use Token based authentication schemes. We are safe today – and ready for tomorrow! Secure by design – Resistant to Quantum attacks 19
  • 20. • LoginCat scripting based authentication adapters will work with all your existing Web based and non-Web based applications. • No changes needed to existing applications. Do they use MD5? SHA1? They are already insecure – LoginCat provides the only means to make existing applications secure and resilient, without code modification. • We manage the passwords, change them on a daily basis, making your existing application un-hackable, and quickly detect any hack attempts. • Appliance or Cloud Based – bring us on premise with an appliance, or run LoginCat via from our hosted cloud. 20 Easily integrate to your existing applications – Cloud or Appliance
  • 21. • User ID provisioning and instant locking from all internal applications, if needed. • Constantly updated – TekMonks will provide firmware updates to include latest security and AI algorithms to protect against emerging threats. • Both mobile (iOS and Android) and web based. • Readily auditable – provides entire audit history of who logged in, when did someone access an internal application, how long they were active, their IP, mobile or web based access and even their location! 21 Other Benefits
  • 23. • A secure by design solution. • No User ID equals no easy way in. No way to target an individual. • Pass phrases – mathematically impossible to crack. • AI based Algorithmic security to stop hackers from even trying. • Works will all your existing applications – Cloud or Appliance based solution. The only affordable way to add security to existing applications. Secure by design, from ground up 23
  • 24. • Cybersecurity and cyber attacks are the top issues for any government or corporate IT department. • Hackers are increasingly professional, well funded and causing billions of dollars in losses. • LoginCat provides a secure, easily Integra table, managed environment which is designed ground up to secure existing applications. Can You Afford Not To? 24
  • 25. Demo. Technology and business IT assessment. Solution proposal. Next Steps 25