VASCO provides several mobile authentication solutions to help organizations successfully implement a secure mobile strategy. These solutions include DIGIPASS for Mobile, Virtual DIGIPASS, DIGIPASS Nano, DIGIPASS powered by Intel ITP, and DIGIPASS SDK. They allow for two-factor authentication on mobile devices for secure access to corporate networks and applications from any location. Case studies demonstrate how National Bank of Fujairah, Rotterdam University, Qatargas, Randstad Germany, and HSBC Bank Brazil have successfully implemented VASCO's mobile authentication solutions.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs.
Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs.
Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world.
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
VMworld Europe 2013
Andrew Hawthorn, VMware
Stig Andersson, UBS
Herve Hulin, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
BlackBerry secures, connects, and mobilizes the enterprise by connecting people, devices, processes, and systems to fully realize a secure “Enterprise of Things.” BlackBerry is no longer about the smartphone, but the smart in the phone and in cars and containers, medical devices and wearables, consumer appliances and industrial machinery, and ultimately the entire enterprise. BlackBerry software secures the Enterprise of Things.
The proliferation of mobile devices is front and center for organizations
in both employee and customer communities. Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Summarizes the problems users experience when managing too many passwords. It describes the various approaches available to organizations to reduce the password burden on users and to improve the security of their authentication systems.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
Case Study
Automotive - SSL/VPN case study
DIGIPASS BY VASCO
International player in automobile manufacturing secures VPN with VASCO’s Server
software Identikey and hardware DIGIPASS.
VASCO Data Security is a leading software security company specializing in authentication solutions. VASCO brings banking
level security to over 50 verticals, including the automotive sector. With VASCO’s DIGIPASS solutions, enterprises can
secure their SSL/ VPN to enable remote access.
Automotive
Case Study
INCreASeD mObILe PrODuCtIVIty WIth
VIrtuAL PrIVAte NetWOrkS
In recent years, many organizations have been
facing the growing need for remote network
access for their employees. As international
companies have different branches worldwide
and employees travel frequently, secured network
infrastructures became a necessity.
A big international player in the automobile
manufacturing industry decided to implement a
Virtual Private Network (VPN) to establish long
distance network connections. By implementing
a VPN, the company can provide access to its
internal private network to employees around the
world with access to the public Internet.
VPNs offer many advantages in terms of cost
savings and scalability. Where before companies
were obliged to install costly dedicated leased
lines to connect different locations; a VPN now
uses public lines and available network capability.
They eliminate administrative and financial
headaches associated with traditional dedicated
leased lines and connection speeds are much
faster allowing workers to be more productive.
Particularly for remote and international locations,
an Internet VPN solution offers superior reach and
quality of service.
A CLIeNtLeSS VPN SOLutION: SeCure
SOCket LAyer VPN
VPN technologies use tunnelling protocols to
create the connection between two endpoints.
Traffic within the VPN tunnel is encrypted so
that communication over the Internet cannot be
intercepted. Users can access a VPN server on the
company network and through it other computers
on the company’s local network.
There are several different types of VPN
connections, each with their own specifications
and advantages.
The company implemented a Secure Socket
Layer (SSL) VPN. SSL/ VPN is a clientless solution
that does not require client software as it uses
the Web browser as the client application.
Another advantage is that access to the network
can be restricted to specific applications using
SSL/ VPN, allowing more precise access control.
Access rights can be configured for different user
groups.
StAtIC PASSWOrDS: the WeAkeSt LINk
SSL/ VPN offers a lot of benefits. Security
however, has been a drawback for many
companies looking to implement VPN solutions.
Employees still need to logon in order to access
the organization’s network. Exactly that logon
procedure proves to be the weak link. Hackers
use many different tactics to compromise
username and password combinations and
ther ...
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
VMworld Europe 2013
Andrew Hawthorn, VMware
Stig Andersson, UBS
Herve Hulin, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
BlackBerry secures, connects, and mobilizes the enterprise by connecting people, devices, processes, and systems to fully realize a secure “Enterprise of Things.” BlackBerry is no longer about the smartphone, but the smart in the phone and in cars and containers, medical devices and wearables, consumer appliances and industrial machinery, and ultimately the entire enterprise. BlackBerry software secures the Enterprise of Things.
The proliferation of mobile devices is front and center for organizations
in both employee and customer communities. Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Summarizes the problems users experience when managing too many passwords. It describes the various approaches available to organizations to reduce the password burden on users and to improve the security of their authentication systems.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
Case Study
Automotive - SSL/VPN case study
DIGIPASS BY VASCO
International player in automobile manufacturing secures VPN with VASCO’s Server
software Identikey and hardware DIGIPASS.
VASCO Data Security is a leading software security company specializing in authentication solutions. VASCO brings banking
level security to over 50 verticals, including the automotive sector. With VASCO’s DIGIPASS solutions, enterprises can
secure their SSL/ VPN to enable remote access.
Automotive
Case Study
INCreASeD mObILe PrODuCtIVIty WIth
VIrtuAL PrIVAte NetWOrkS
In recent years, many organizations have been
facing the growing need for remote network
access for their employees. As international
companies have different branches worldwide
and employees travel frequently, secured network
infrastructures became a necessity.
A big international player in the automobile
manufacturing industry decided to implement a
Virtual Private Network (VPN) to establish long
distance network connections. By implementing
a VPN, the company can provide access to its
internal private network to employees around the
world with access to the public Internet.
VPNs offer many advantages in terms of cost
savings and scalability. Where before companies
were obliged to install costly dedicated leased
lines to connect different locations; a VPN now
uses public lines and available network capability.
They eliminate administrative and financial
headaches associated with traditional dedicated
leased lines and connection speeds are much
faster allowing workers to be more productive.
Particularly for remote and international locations,
an Internet VPN solution offers superior reach and
quality of service.
A CLIeNtLeSS VPN SOLutION: SeCure
SOCket LAyer VPN
VPN technologies use tunnelling protocols to
create the connection between two endpoints.
Traffic within the VPN tunnel is encrypted so
that communication over the Internet cannot be
intercepted. Users can access a VPN server on the
company network and through it other computers
on the company’s local network.
There are several different types of VPN
connections, each with their own specifications
and advantages.
The company implemented a Secure Socket
Layer (SSL) VPN. SSL/ VPN is a clientless solution
that does not require client software as it uses
the Web browser as the client application.
Another advantage is that access to the network
can be restricted to specific applications using
SSL/ VPN, allowing more precise access control.
Access rights can be configured for different user
groups.
StAtIC PASSWOrDS: the WeAkeSt LINk
SSL/ VPN offers a lot of benefits. Security
however, has been a drawback for many
companies looking to implement VPN solutions.
Employees still need to logon in order to access
the organization’s network. Exactly that logon
procedure proves to be the weak link. Hackers
use many different tactics to compromise
username and password combinations and
ther ...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT security, then you will be hacked." Many analysts concur that spending on strong authentication provides the greatest security return on investment. This educational white paper, written by Richard Stiennon, Chief Research Analyst at IT-Harvest and Executive Editor of securitycurrent, explores the concept of identity platforms.
• How to fix intrinsic weaknesses in authentication regimes that result in gaping and trivially exploitable vulnerabilities
• Explore the core features of an authentication and identity platform
• Examine specific features and components organizations should require in a software authentication platform
Mobile devices can boost productivity and competitive advantage, but your enterprise-IT organization must support new mobile strategies, while complying with government regulations and maintaining security. See how you can implement robust security features in your existing apps with SAP Mobile App Protection by Mocana.
Mobile apps are the primary cause behind this rise in mobile productivity. These virtual technologies connect servers and APIs all over the world to provide users with services, data, convenience, and value. For information, visit our website :
https://www.cerebruminfotech.com/
I Brought My Own Device. Now What? by Paul Andersen, Marketing Manager at Array Networks .
The consumerization of IT is underway. In its report Tablets Will Rule the Future Personal Computing Landscape, Forrester predicts sales of 375 million tablets in 2016 with over 750 million tablets in use.
An introduction to Solus - learn how Solus is combatting Cyber Crime and online security breaches with it's secure, easy-to-use, authentication platform. It's multifactor application uses biometric identification and scrambled pinpad technology and can be integrated with enterprise apps.
Make sure government data is as safe as it can be. Secure documents using facial recognition to ensure confidential information is seen only by intended parties.
With the potential to create everything from new revenue opportunities, to increased customer acquisition to cost savings, mobile is changing the landscape of banking as we know it. The rollout of foundational mobile services is already yielding tremendous success, and by increasing security while keeping a keen eye on user experience, leading banks and financial services providers can offer more advanced mobile services, which will play a key role in their growth strategies.
By broadening mobile banking offerings, financial institutions will be positioned to increase mobile transactions, shift transactions away from higher-cost channels, and retain and attract more customers.
To be successful with mobile, VASCO understands that banks need to pay close attention to the security of mobile applications and consumers, without creating challenges for the user experience.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
How to successfully implement a secure mobile strategy
1. Make it Mobile
How to successfully implement a
secure mobile strategy
www.vasco.com
2. Make it Mobile
T
he mobile revolution is inexorable. Mobile devices such as smart phones, netbooks
and tablets proliferate in today’s personal and professional environment. In order to
adapt to the fast paced virtualization and mobilization trend, organizations worldwide
will have to make their applications, data and corporate information accessible from
any portable device for customers, suppliers and employees.
Do benefits
concerns?
outweigh
The accessibility of mobile applications and
mobile working yields many benefits: it can
be time-saving, cost reducing and the added
bonus of flexibility can enhance overall
productivity and customer loyalty. While
embracing the flexibility of mobile working, it is
essential not to be heedless of the dangers that
may come with it. Concerns about data integrity,
the privacy and accessibility of sensitive data,
and data protection requirements are the most
significant obstacles for financial and business
organizations to embrace the mobility trend.
Potential threats for mobile applications such
as m-banking and m-commerce or even
remote access to a corporate network, are
similar to those of traditional applications,
only the platform and technology have
changed. As the business world will continue
to change under the influence of continuous
technological developments, working practices
will change as well. And with the increasing
trend of BYOD (Bring Your Own Device) on the
work floor, security remains all-important.
1
Mobile Facts
1,9 billion
there will be
mobile phones worldwide by 2013
69,7 %
20,9 %
3,5 %
3%
2,9 %
Android
Apple
BlackBerry
Windows
Other
Market share based on Q4 2012
3. How to successfully implement
a secure mobile strategy
Security is as strong as the weakest link
Protecting access to online applications such as m-commerce or m-banking services or access to corporate
networks might be a good solution. However, any security system is only as effective as its weakest link.
Source: Gartner
350 million
employees will use it for work
50%
51%
35%
60%
do not password
protect their
device
Consumers and employees often use the same
passwords for a multitude of professional and
personal applications. By reusing the same
password over and over again, they put every
application containing confidential information
– although unwillingly and perhaps unknowingly
– at risk. Furthermore, mobile devices are often
not password-enabled and lack the ability to
authenticate users and control access to data
stored on the devices.
have financial
apps on their
phones
have shopping
apps
desire secure
mobile
authentication
VASCO
helps you to succesfully
implement a
secure
mobile strategy
2
4. Added security
authentication
layer
with
two-factor
Several mobile authentication solutions to
suit your needs
Deploying an adequate security environment for
every mobile device used by customers, consumers
or employees is a daunting task. Furthermore, end
users don’t want to be burdened with laborious
procedures in order to retrieve information or
complete an online transaction.
VASCO has several solutions in its product
portfolio that were developed with the mobile
user in mind. DIGIPASS is VASCO’s renowned
technology that replaces weak static passwords
with dynamic passwords that have a limited
validity. Fraudsters can thus not reuse an end
user’s password at a later time. Additionally,
VASCO’s mobile solutions also provide
e-signature capability to sign online transactions
in all security. This e-signature will be calculated
using transaction data, time and the secret stored
on the mobile device. If intercepted or altered,
the electronic signature will expire and the
transaction will not be completed.
Two-factor authentication offers an answer to
these challenges. It provides a higher level of
security than traditional passwords and ensures
that only authorized people gain access to
sensitive information. The mobile device is then
used as a second factor and can be used as an
authentication device to generate a strong onetime password. These passwords, with a limited
validity, can be generated on the device itself or
can be sent via text message to the user’s mobile
phone.
VASCO’s authentication solutions can be
integrated into any existing infrastructure offering
multi-platform support. You can also deploy
multiple devices to secure your application
enabling you to differentiate according to your
authentication needs.
Key benefits of mobile authentication
• Increased flexibility
• Competitor differentiation
authentication
• Excellent user convenience
• Increased customer trust
• Intuitive use
• No need to deploy hard- or software devices
• Easy upgradeable
• Low TCO
• Enhanced security
• Limited impact on end-user’s experience
3
thanks
to
5. Mobile security for everyone
How to secure your assets?
Two-factor authentication ensures that
only authorized people get access to your
sensitive information, your corporate
network or your online application.
VASCO’s mobile solutions and services:
•
DIGIPASS for Mobile
•
Virtual DIGIPASS
•
DIGIPASS Nano
•
DIGIPASS powered by Intel ITP
•
DIGIPASS SDK
VASCO’s mobile software solutions are
suited for any organization that wants
to provide secure remote access to
its corporate network or applications.
Regardless of size, VASCO offers solutions
that fit your needs.
Whether it is to secure your mobile
banking, your e-commerce or your gaming
applications or your confidential business
data, all software solutions can be
deployed to fit your needs. We have
proven expertise and experience with
approximately
10,000
customers
worldwide, including almost 1,700
financial institutions.
4
6. VASCO’s mobile
authentication solutions
Software Authentication
DIGIPASS for Mobile
DIGIPASS for Mobile is an application that generates one-time passwords and e-signatures on the mobile
device of your choice. The time-based one-time password (OTP) is a dynamic authentication code and the
most effective defense against complex cyber attacks.
Users will experience the freedom to conduct their business securely from a mobile device
while traveling throughout the world. To enhance user convenience DIGIPASS for
Mobile supports QR-codes. Users simply capture the QR-code, enter their
PIN code and are instantly logged on to the application. Document or
transaction signing is equally simple.
The DIGIPASS for Mobile application itself is bound to devicedependent components and linked to the user with a PIN
code. Therefore the applications cannot be duplicated on
another phone or mobile device.
DIGIPASS for Mobile offers enhanced provisioning services
including HSM server side implementation. Customers willing
to outsource provisioning can make use of VASCO’s DIGIPASS
as a Service provisioning service.
For more information, visit www.vasco.com/DIGIPASSforMobile
SMS Authentication
Virtual DIGIPASS
Virtual DIGIPASS offers a user-friendly and cost-efficient solution for strong user authentication and
e-signatures. Virtual DIGIPASS allows dynamic passwords to be sent to a user’s mobile phone via SMS.
The solution can be used as a primary or back-up authentication method
in case an authentication device is lost or has been forgotten. This
guarantees a continuity of service without requiring helpdesk
support.
Based on two-factor authentication - something you know
and something you “already” have - Virtual DIGIPASS adds
another layer of security to log-in functions where static
passwords are still in use.
5
For more information, visit
www.vasco.com/VirtualDIGIPASS
7. VA S C O ’ s
m o b i l e
authentication
solutions
SIM Authentication
DIGIPASS Nano
DIGIPASS Nano enhances the security of online service channels
through the use of e-signatures and end user authentication.
DIGIPASS Nano has a unique form factor and opens new
perspectives in using mobile devices as an authentication
means. The solution consists of a thin film that is placed on
top of any SIM-card enabling the phone to generate one-time
passwords and e-signatures. The solution is supported by
every compatible mobile phone fitted with a SIM Card.
Mobile users will be able to perform secure transactions,
access business-critical data or transfer money anywhere at
any given time.
For more information, visit www.vasco.com/DIGIPASSNano
Native integration
DIGIPASS SDK
DIGIPASS SDK allows you to natively integrate DIGIPASS technology into your applications. The solution
adds strong authentication directly to the application without external software interacting with the
company’s system. One-time password and e-signature capability become thus an integral part of the
online application.
With this solution virtually any device with processing power can be
turned into a DIGIPASS authentication device. It leverages the use of
existing applications and devices such as third party applications,
a browser, desktop or server for two-factor authentication and
e-signatures.
DIGIPASS SDK allows the integration of strong authentication
into any regular software environment. It can also rely on any
external Secure Executive Environment. As a result, DIGIPASS
SDK has the best of two worlds: ease of integration, worldwide
support and extended security to hardware processing.
For more information, visit www.vasco.com/DIGIPASSsdk
6
8. VA S C O ’ s
m o b i l e
authentication
solutions
Embedded Authentication
DIGIPASS Powered by Intel
Intel® Identity Protection Technology (Intel® IPT) is a two-factor authentication capability built into select
2nd Generation Intel® Core™ processor based PCs helping to prevent unauthorized access to important
personal accounts.
Intel IPT is a powerful, additional layer of security that links a PC to
the online account or financial asset of a user’s choice, decreasing
the ability of thieves to access account information from nonassociated computers. Intel IPT helps to keep your accounts
secure, even if the first layer of authentication is breached.
VASCO is utilizing the embedded security feature of Intel IPT
from the world leader in computing innovation. This solution
leverages the industry’s best security on nearly every laptop
and desktop in the world – without the need to provision any
software or hardware to the end user. An activation process
is very simple and can be configured according to a website’s or
application provider’s specifications.
For more information, visit www.vasco.com/DIGIPASSIntel
Don’t forget to discover VASCO’s
latest secure mobile application
DOWNLOAD NOW
& other
7
9. VASCO
BUSINESS
CASE
National Bank of
Fujairah relies on
VASCO’s DIGIPASS
to protect corporate
applications and
transactions
Challenge
About
Ease-of-use was very important, just like the trust
the solution should radiate. After all, NBF is an
innovative bank that cares about its customers.
National Bank of Fujairah (NBF) was
incorporated in 1982 and has had a long
established reputation in the areas of
corporate and commercial banking, trade
finance and treasury. As a leading bank in
United Arab Emirates, NBF has always set
great store by security and data protection.
Therefore, the bank has decided to implement
VASCO’s DIGIPASS technology to protect
its internal applications and to make sure
its corporate banking users can approve
transactions securely.
Objective
On the one hand, National Bank of Fujairah wanted
to protect internal applications, such as OWA, VPN
and Sharepoint. On the other hand, the bank was
looking for a secure transaction solution.
Solution
DIGIPASS 275 and DIGIPASS for Mobile were
selected, in order to give the end user the possibility
to choose his preferred authentication tool. Both
solutions can generate OTPs and have a challenge/
response functionality, so user authentication and
electronic signing can be executed by the same
device.
“
For us, it was important to partner with
a market leader that could demonstrate
expertise in the financial sector.
Furthermore, the availability of various
models and the possibility to present
two different options to our customers
were important to us.”
Nasar Siddiqui
Head of Electronic Channels at NBF
8
10. VASCO
BUSINESS
CASE
Rotterdam University
secures access to critical
information with DIGIPASS
for Mobile and DIGIPASS
GO 3 and GO 6
Objective
About
Rotterdam University was looking for a way to
grant secure access to sensitive information to
its employees. On top of that they only wanted
to grant a few people the ability to add, change or
delete important information without impacting the
existing software and application functionalities.
Employees of Rotterdam University have to
log in through the central login system to get
access to the different decentralized systems
the educational institution works with. In order
to guarantee that only employees get access
to this important information such as exams
and personal details, VASCO’s authentication
solution with one-time passwords (OTPs) was
implemented.
Challenge
A solution that can be easily integrated in the central
login system; the Novell e-directory with NMAS, that
is easy to use. After a one time login, the employee
should have access to the multiple applications and
systems.
Solution
The University of Rotterdam employees now use
VASCO authentication technology to consult or
adapt important information. Employees can choose
between a hardware DIGIPASS GO 3 and GO 6 or
a software DIGIPASS. The back-end consists of
DIGIPASS plugin for NMAS.
9
“
The app is installed on the employee’s
smartphone, so dynamic passwords
can be generated on their own device.
This is considered a significant
advantage. The integration went
smoothly, we had good support from
VASCO and we went through the
entire integration process without a
problem.”
Eric Kerkdijk, ICT Supervision &
Operations
Manager
Rotterdam
University.
11. VASCO
BUSINESS
CASE
Qatargas secures
corporate network
access by
implementing DIGIPASS
and IDENTIKEY into its
Citrix metaframe
Challenge
About
Implement a Citrix compliant solution that secures
the company’s network and applications enabling
remote access for executive management, remote
offices and contractors.
Qatargas pioneered the liquefied natural
gas industry in Qatar. Today the company is
realizing its vision to deliver LNG to customers
around the globe from its facilities in Qatar.
With remote offices and on- and offshore
plants in different locations, Qatargas was
looking for a secure remote access solution
allowing its employees and contractors
worldwide to access its corporate network and
business applications.
Objective
The company deployed IDENTIKEY Gold Edition
together with DIGIPASS GO 6, Virtual DIGIPASS and
DIGIPASS for Mobile. This combination allows the
group to secure access to its business applications
for its different target groups. IDENTIKEY works
seamlessly with the various DIGIPASS solutions
and requires no additional hardware investment.
Moreover, the number of users over time is easy to
extend thanks to the flexible licensing system.
Solution
DIGIPASS has leveraged the security level
of Qatargas’ remote network and business
applications through the use of dynamic onetime passwords. DIGIPASS in combination with
IDENTIKEY is fully compliant with Citrix’ solutions
hence providing secure remote access to the Citrix
metaframe.
“
We prefer to use software authentication devices whenever applicable
to avoid the logistic challenges of
delivering hardware devices to our
overseas offices and plants. The fact
that VASCO’s solutions are reliable
and simple to manage, was a decisive
factor in the decision making process.”
Mohammed Abu-Nejim
Head of Data Networks at Qatargas
10
12. VASCO
BUSINESS
CASE
Randstad Germany
uses VASCO to secure
remote access
Objective
About
Replace the existing authentication solution for
secure remote access to the corporate network for
approximately 1,000 mobile employees.
To protect its sensitive data from unauthorized
access, the employment agency Randstad
Germany has been relying for years on a strong
two-factor authentication solution to secure its
remote access. When after the spring of 2011 a
security issue was detected in the solution of
the manufacturer at the time, Randstad decided
to switch to VASCO’s DIGIPASS authentication
solution and IDENTIKEY Authentication Server.
Challenge
The migration had to be made quickly and on the
fly, without compromising the security of the remote
access solution.
Solution
Randstad opted for the combination of VASCO’s
IDENTIKEY Authentication server and DIGIPASS
authenticators. As a back-up for the hardware
DIGIPASS, Randstad also deployed Virtual
DIGIPASS and DIGIPASS for Mobile.
“
“Availability and safety were our
main priorities for our remote access
solution. The concerns we had about
the security of our previous solution
provider prompted us to look around for
alternatives… We were really impressed
by the possibilities and found it to be
more suitable than our former solution.”
Stefan Gräf, Team Manager Network &
Storage at Randstad Germany.
11
13. VASCO
BUSINESS
CASE
HSBC Bank Brazil
provides full integration
between its electronic
channels with m-banking
and VASCO’s DIGIPASS
for Mobile
Objective
About
Enhance HSBC Bank Brazil’s multi-channel
approach by offering secure m-banking services to
its retail customer base.
HSBC Bank Brazil is the first bank in
Brazil
to
offer
integrated
m-banking
services based on VASCO’s DIGIPASS
for Mobile. HSBC retail customers can
withdraw cash from ATMs, make transactions,
money transfers and online payments using their
mobile phone as an authentication device.
Challenge
To secure HSBC m-banking services, the application
must be small and generic, fit for any mobile
device. Furthermore, the application needs to be
chip, device and telecom provider independent.
Solution
DIGIPASS for Mobile conveniently provides secure
m-banking services anywhere, anytime. From now
on, HSBC Brazil retail customers are identified
through their mobile phone and social security
number instead of their account number. This
new method whereby the mobile phone is used
as an authentication device enables customers to
use their mobile phone to access HSBC services
through all channels (ATM, Internet Banking,
Phone Banking) without needing to remember their
account and branch number in addition to user
name and password combinations.
“
“We chose VASCO because the
company is worldwide recognized as a
reliable global authentication services
provider. Furthermore, DIGIPASS for
Mobile is a highly scalable solution
with a very cost-effective maintenance
and roll out. VASCO’s mobile
authentication solution allows HSBC
Brazil to offer its customers a highly
secure yet convenient and simplified
online user experience.”
Marcello Veronese
Head of One HSBC distribution
12
14. VASCO
BUSINESS
CASE
Insites implements
VASCO’s IDENTIKEY
and DIGIPASS
solutions to
guarantee data
confidentiality
Objective
About
Implement a user-friendly remote access solution
that is simple to integrate. Insites wanted to grant
its employees secure remote access to the network
without compromising data confidentiality.
Insites Consulting is a global online market
research company, known for its creative
research solutions and specialized in
communication and storytelling. Headquartered
in Belgium, Insites also has offices in the United
Kingdom, the Netherlands and Switzerland.
Gathering large amounts of confidential data,
the company was in need of a security solution
enabling secure remote access to its network
data through a VPN portal.
Challenge
The authentication solution needed to be costefficient, user-friendly, flexible and compatible with
the Citrix XenApp / XenDesktop network.
Solution
Insites deployed VASCO’s DIGIPASS GO 3, GO 6 and
in a later phase, DIGIPASS for Mobile in combination
with IDENTIKEY Authentication Server. This userfriendly solution was very simple to implement and
ensures secure remote access to the Citrix XenApp
/ XenDesktop network for Insites’ employees.
13
“
We wanted to implement a solution
that not only would secure access to
our business-critical data, but that also
allowed us to allocate different users to
one user account. We decided to deploy
DIGIPASS for Mobile and to offer our
employees an even greater flexibility
as everyone possesses a mobile phone
and consequently always carries his
DIGIPASS with him.”
Gunter Van de Velde
IT manager at Insites
15. VASCO
BUSINESS
CASE
Picanol Group
implements IDENTIKEY
Gold Edition in
combination with
DIGIPASS technology
to secure access to
the company’s network
Objective
About
The Picanol Group wanted to implement a complete
solution for its vendors, consultants and external
collaborators to secure internal and external access
to its various business applications.
The Picanol Group is an international,
customer-oriented group that specializes in the
development, production and sales of weaving
machines and other high technology products,
systems and services.
Challenge
The company wanted a solution that could be
implemented in phases and would be easy to
expand. The solution eventually will be extended to
not only secure remote access to applications, but
also internal confidential information without the
Group needing to make additional investments in a
later phase.
Solution
The company deployed IDENTIKEY Gold Edition
together with DIGIPASS GO 6, Virtual DIGIPASS and
DIGIPASS for Mobile. This combination allows the
group to secure access to its business applications
for its different target groups. IDENTIKEY works
seamlessly with the various DIGIPASS solutions
and requires no additional hardware investment.
Moreover, the number of users over time is easy to
extend thanks to the flexible licensing system.
“
We wanted a solution that would be
available to suppliers, consultants
and people with or without a mobile
company phone. Therefore we decided
to deploy different types of DIGIPASS
devices. This solution gives us the
additional flexibility that we need.“
Bart Lagast
System Engineer at the Picanol Group
14
16. VASCO
BUSINESS
CASE
Connection to realtime sales information
for Lightplus thanks to
DIGIPASS for Mobile
Objective
The sales team wanted to get rid of all the phone
calls they had to make to gain safe access to the
internal ERP-system. When they are at a customer,
they needed the real-time information to offer best
deals and to inform them correctly.
Challenge
The solution had to be straightforward, without too
many devices or different passwords that had to be
remembered. Simplicity was the primary driver.
Solution
Lightplus implemented DIGIPASS for Mobile,
allowing remote secure access to the ERP system
without the need to carry an extra device which can
easily be forgotten. In the back-end, IDENTIKEY
Authentication Server was deployed, in a
combination with Citrix.
15
About
Mobile has been
For ages, light Facts one
of the main
needs for every creature, states Lightplus. The
company is an authoritative Belgian importer
there will be
and distributor of LED lighting and low-energy
mobile phones worldwide by 2013
light bulbs since 2003. When on the move, the
Lightplus sales team has to log on securely to
the internal ERP system. However, the initial
procedure proved to be time-consuming and
inconvenient. To overcome this problem,
Android
Lightplus implemented strong authentication
with VASCO’s DIGIPASS for Mobile and
IDENTIKEY Authentication Server.
1,9 billion
“
69,7 %
20,9 %
3,5 %
3%
2,9 %
Apple
BlackBerry
Our VPN-connection is now protected
by strong authentication. We are
happy that the access is now easy
Windows
and secure. Our sales team agrees
that this mobile solution was the best
option. The endless phone calls to get
Other
access belong to the past. Everything
has become very easy. They consider
this as necessary, but confident andQ4 2012
Market share based on
secure.”
Jo Beuls
managing director of Lightplus
17. VASCO
BUSINESS
CASE
VASCO’s authentication
solutions help Global
Radio to secure remote
access and develop
a long term security
policy
Objective
Source: Gartner
Global Radio was looking for an effective, costeffective and user-friendly authentication solution
to secure remote access for website content editors
employees will use it for work
working from home. The solution needed not only
to meet Global Radio’s immediate authentication
needs, but also had to be suited for future larger
deployments within the company.
350 million
50%
51%
35%
60%
Solution
Challenge
do not password
protect their
device
have financial
The company had already made prior investments,
apps on their
and therefore required a flexible approach with
phones
a mix of hard- and software authenticators. The
solution must fit seamlessly within the existing
have shopping
infrastructure. Moreover, the system had to be up
apps
and running within eight weeks.
desire secure
mobile
authentication
VASCO’s IDENTIKEY Server Enterprise Edition at
the back-end and a combination of DIGIPASS for
helps you to succesfully
Mobile, Virtual DIGIPASS and DIGIPASS GO 3 at
the end-user
mobile strategy
implement aside, allowed Global Radio to quickly
implement the authentication solutions within the
limits of the tight deadline. The scalability and the
flexibility of the solution also provide Global Radio
with the opportunity to expand strong authentication
to other company applications in the future.
VASCO
secure
About
Global Radio is UK’s largest commercial radio
company and the home of many leading
commercial radio brands. When searching for a
strong authentication solution to secure remote
access for its website content editors, Global
Radio opted for VASCO’s DIGIPASS technology
and IDENTIKEY Authentication Server at the
back-end.
“
DIGIPASS for Mobile is a budget
friendly solution: you don’t have to
worry about the distribution, and
the authenticators can be managed
centrally by the company. It is also
a very-user friendly solution, as the
download and employment process
are very straightforward.”
Ross Draper, IP Infrastructure Manager
at Global Radio.
16