PREVENT UNAUTHORIZED ACCESS
THE DEVICE IS THE KEY

Strong authentication is a critical part of today’s business strategy as internet
enabled devices are ubiquitous in our work and personal lives. At the same time,
passwords remain the primary form of protection which is inherently weak, and
malware attacks are pervasive. Consequently, users can be impersonated easily
from foreign devices by using stolen user credentials.

Today’s Multi-factor or Strong Authentication (SA) solutions are often cumbersome,
expensive, not widely adopted and vulnerable to “man-in-the-middle” (MITM) and
man-in-the-browser (MITB) attacks, and require excessive user involvement. There
shouldn’t be any tradeoffs between strength of authentication and user experience.



    NetAuthority Company Overview

NetAuthority has created a new standard in multi-factor authentication standard by
offering sub-second device and transaction verification where the user device itself   Over 200 computers are
becomes the key or token for authentication. Its Dynamic Device Key (DDK) solution     infected with malware every
utilizes a patented device challenge/response process. The device itself generates     minute, and the average
unique keys, providing irrefutable authentication. Another integral component is its   security breach costs a
Transaction Verification Key (TVK) technology which provides strong device-centric     company $5.5 million or $194
transaction verification to detect and prevent MITB-injected transactions.             for each record breached.




     Learn more about irrefutable authentication technology. www.netauthority.com | info@netauthority.com (866) 785.7863
Ensure Trusted Devices
& Transactions


NetAuthority’s device and transaction authentication solution                                                                    Benefits
provides the broadest protection against:
                                                                                                                                  • Absolute Confidence in
 • Key Loggers                                        • Adaptive Multi-Factor Authentication Engine                                 Authentication
 • Stolen Cookies and User                            • Out-of-Band OTP Authentication                                            • Simplicity
   Credentials                                        • Multi-Stage Device Authentication with Attribute                          • User Transparency
 • Phishing Attacks                                     Feed and Policy Engine                                                    • Low TCO
 • Circumvented KBA                                   • Dynamic Device Keys                                                       • Ease of Deployment
 • Man-in-the-Browser Attacks                         • Flexible Device Provisioning and Registration                             • Balance Between
 • Man-in-the-Middle Attacks                          • Synthetic Keys                                                              Strength of Security and
                                                      • Multi-Tenant Key Rotation                                                   Ease of Use
                                                                                                                                  • Prevent Breaches, Fraud
                                                               Key Technology Differentiators                                       and Loss
                                                                                                                                  • Zero-Day Protection


        “Solutions for authenticating users and transactions have always been a
        balance of user experience, strength of security and total cost – and the
        corresponding risks of user dissatisfaction, data loss and fraud and negative
        impact on corporate brands. The market trend has been towards solutions
        that are simple and transparent for end-users, while offering higher levels of
        protection against online fraud.”

        Derek Brink, VP & research fellow-IT Security at Aberdeen Group



Protect Assets & Brands                                                                                              Enterprise Apps, Data                  Mobile Payments


Device-centric authentication is designed for mass deployment for organizations that need
to protect sensitive assets, whether informational or financial.
                                                                                                                                                                         Gaming Sites
                                                                                                                                            ity Brea
                                                                                                                                         cur
E-commerce/online businesses, financial service companies, cloud service firms, healthcare
                                                                                                                                                    ch
                                                                                                                                       Se
                                                                                                                                                              ce
                                                                                                                                  No




                                                                                                                                                                s




providers, insurers, social media service companies, government agencies, enterprises
deploying, Bring Your Own Device (BYOD) programs - virtually any organization that is                         SaaS, Cloud
                                                                                                               Services
                                                                                                                                                                   ns
                                                                                                                                 No




engaged in extensive online activity can benefit from device-centric strong authentication.
                                                                                                                                                                  tio




                                                                                                                                      ra
                                                                                                                                                                  uc
                                                                                                                                   T




                                                                                                                                           ns
                                                                                                                                                a c tio n A b d


NetAuthority is the leader in strong authentication solutions for trusted Internet connected
devices and transactions. Our solution secures information and financial assets, assures
                                                                                                                Online Banking                                          E-Commerce
user confidence that drives business, and protects assets and brand equity. NetAuthority’s
patented device-centric methods provide irrefutable accuracy with best in class security,
ease of use and value.                                                                                                             Social Networks



NetAuthority, Inc. 201 California Street, Suite 325, San Francisco, CA 94111 | Phone: +1 (866) 785-7863 | www.netauthority.com © 2013 NetAuthority, Inc. All Rights Reserved

NetAuthority Brochure

  • 1.
    PREVENT UNAUTHORIZED ACCESS THEDEVICE IS THE KEY Strong authentication is a critical part of today’s business strategy as internet enabled devices are ubiquitous in our work and personal lives. At the same time, passwords remain the primary form of protection which is inherently weak, and malware attacks are pervasive. Consequently, users can be impersonated easily from foreign devices by using stolen user credentials. Today’s Multi-factor or Strong Authentication (SA) solutions are often cumbersome, expensive, not widely adopted and vulnerable to “man-in-the-middle” (MITM) and man-in-the-browser (MITB) attacks, and require excessive user involvement. There shouldn’t be any tradeoffs between strength of authentication and user experience. NetAuthority Company Overview NetAuthority has created a new standard in multi-factor authentication standard by offering sub-second device and transaction verification where the user device itself Over 200 computers are becomes the key or token for authentication. Its Dynamic Device Key (DDK) solution infected with malware every utilizes a patented device challenge/response process. The device itself generates minute, and the average unique keys, providing irrefutable authentication. Another integral component is its security breach costs a Transaction Verification Key (TVK) technology which provides strong device-centric company $5.5 million or $194 transaction verification to detect and prevent MITB-injected transactions. for each record breached. Learn more about irrefutable authentication technology. www.netauthority.com | info@netauthority.com (866) 785.7863
  • 2.
    Ensure Trusted Devices &Transactions NetAuthority’s device and transaction authentication solution Benefits provides the broadest protection against: • Absolute Confidence in • Key Loggers • Adaptive Multi-Factor Authentication Engine Authentication • Stolen Cookies and User • Out-of-Band OTP Authentication • Simplicity Credentials • Multi-Stage Device Authentication with Attribute • User Transparency • Phishing Attacks Feed and Policy Engine • Low TCO • Circumvented KBA • Dynamic Device Keys • Ease of Deployment • Man-in-the-Browser Attacks • Flexible Device Provisioning and Registration • Balance Between • Man-in-the-Middle Attacks • Synthetic Keys Strength of Security and • Multi-Tenant Key Rotation Ease of Use • Prevent Breaches, Fraud Key Technology Differentiators and Loss • Zero-Day Protection “Solutions for authenticating users and transactions have always been a balance of user experience, strength of security and total cost – and the corresponding risks of user dissatisfaction, data loss and fraud and negative impact on corporate brands. The market trend has been towards solutions that are simple and transparent for end-users, while offering higher levels of protection against online fraud.” Derek Brink, VP & research fellow-IT Security at Aberdeen Group Protect Assets & Brands Enterprise Apps, Data Mobile Payments Device-centric authentication is designed for mass deployment for organizations that need to protect sensitive assets, whether informational or financial. Gaming Sites ity Brea cur E-commerce/online businesses, financial service companies, cloud service firms, healthcare ch Se ce No s providers, insurers, social media service companies, government agencies, enterprises deploying, Bring Your Own Device (BYOD) programs - virtually any organization that is SaaS, Cloud Services ns No engaged in extensive online activity can benefit from device-centric strong authentication. tio ra uc T ns a c tio n A b d NetAuthority is the leader in strong authentication solutions for trusted Internet connected devices and transactions. Our solution secures information and financial assets, assures Online Banking E-Commerce user confidence that drives business, and protects assets and brand equity. NetAuthority’s patented device-centric methods provide irrefutable accuracy with best in class security, ease of use and value. Social Networks NetAuthority, Inc. 201 California Street, Suite 325, San Francisco, CA 94111 | Phone: +1 (866) 785-7863 | www.netauthority.com © 2013 NetAuthority, Inc. All Rights Reserved