RaonSecure is a leading ICT security company that offers mobile, IoT, and integrated authentication security services and solutions. It has developed technologies like biometric authentication and next-generation authentication services. RaonSecure aims to enhance global security through its R&D programs and by educating security professionals. It is committed to developing cutting-edge security solutions and strengthening the security industry. RaonSecure has over 500 business customers and 30 million individual customers in key sectors, and its products and services include mobile device management, mobile vaccines, virtual keyboards, electronic signatures, and more.
The proliferation of mobile devices is front and center for organizations
in both employee and customer communities. Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
The proliferation of mobile devices is front and center for organizations
in both employee and customer communities. Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
Since it was first introduced in 1858, biometric technology has come a long way. Today, highly advanced, highly accurate biometric technologies can authenticate identity using a person’s fingerprint, iris/eye, facial features, and voice, to name a few. With the rise in identity and data theft, the global financial services industry is ramping up its use of biometrics to provide convenient, reliable, and highly secure protection.
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Las organizaciones necesitan evolucionar más allá del nombre de usuario y contraseña básico y asegurar las transacciones en línea con un abanico de opciones de autenticación segura.
How do you ensure identity and safeguard privacy when the primary communication channel between you and the other party is through mobile apps? Kris explains how itsme makes it easier for anyone with a mobile phone and a Belgian eID to digitally log in, register, confirm transactions and even sign documents.
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
Mobile devices have been targeted by cybercriminals for over seven years now. However, in 2014 things got serious. Cybercriminals realized that a major portion of eCommerce and online banking is moving to the mobile space, and with that companies are giving clients more options for larger transactions, and actions that were previously only performed on PCs. New PC grade malware appeared on mobile devices, some old PC tricks were transformed for mobile, and new mobile specific threats emerged. In this session we will analyze these threats using multiple customer case studies and Trusteer’s security team research data. We also take a look at the latest mobile threats, threats in development and mitigation tactics.
The use of biometrics to enable user authentication and identity assurance is an essential improvement over usernames and passwords, and innovations in mobile devices, wearables, and other technologies are helping bring biometrics to mainstream audiences. In this webinar, we'll discuss developments in biometrics and related technologies and how different markets are likely to deploy biometric authentication in 2017.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
Janice recently returned from a Special Counsel position with the Senate Judiciary Committee, where she was asked to testify and then return to staff to support the national, border and identity security aspects of the now Senate-passed immigration reform legislation. Ms. Kephart is an internationally recognized border and ID security expert, who served as counsel to the 9/11 Commission and was a key author of the Staff Monograph, 9/11 and Terrorist Travel as well as the immigration and identity security-related facts and recommendations in the 9/11 Commission Report.
More info: http://www.sibassoc.org/#!aboutsiba/csgz
Janice speaks regularly at conferences, to international media, publishes articles and opeds around the world, and has testified before Congress 16 times on issues of border and ID security.
Smart OpenID brings strong authentication for internet cloud service access to mobile devices by leveraging the crypto capabiliteis provided by smart cards and secure elements in mobile phones.
Presentation held at Chip-To-Cloud Forum in Nice, September 2012
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Mobility is increasing enterprise risk by adding further complexity and fragmentation to existing access management environments. Join us to learn how you can provide employees mobile access to enterprise applications and corporate data without compromising security.
Securing mobile starts by authenticating users and ensuring their mobile devices has not been compromised. When you authenticate a user, it’s not enough to simply confirm the user’s password is correct. You must look at other factors at the time of authentication including: time of day, device type and IP address to name just a few. This is known as risk-based authentication and it’s an important part of mobile security.
In this presentation, we provide an overview of IBM’s Mobile Security Framework and how you can use risk-based authentication to protect your enterprise.
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Why FIDO Matters: Digital Government ServicesFIDO Alliance
Presentation on why FIDO is important to government, focusing on authentication and data security.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
Since it was first introduced in 1858, biometric technology has come a long way. Today, highly advanced, highly accurate biometric technologies can authenticate identity using a person’s fingerprint, iris/eye, facial features, and voice, to name a few. With the rise in identity and data theft, the global financial services industry is ramping up its use of biometrics to provide convenient, reliable, and highly secure protection.
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
Las organizaciones necesitan evolucionar más allá del nombre de usuario y contraseña básico y asegurar las transacciones en línea con un abanico de opciones de autenticación segura.
How do you ensure identity and safeguard privacy when the primary communication channel between you and the other party is through mobile apps? Kris explains how itsme makes it easier for anyone with a mobile phone and a Belgian eID to digitally log in, register, confirm transactions and even sign documents.
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
Mobile devices have been targeted by cybercriminals for over seven years now. However, in 2014 things got serious. Cybercriminals realized that a major portion of eCommerce and online banking is moving to the mobile space, and with that companies are giving clients more options for larger transactions, and actions that were previously only performed on PCs. New PC grade malware appeared on mobile devices, some old PC tricks were transformed for mobile, and new mobile specific threats emerged. In this session we will analyze these threats using multiple customer case studies and Trusteer’s security team research data. We also take a look at the latest mobile threats, threats in development and mitigation tactics.
The use of biometrics to enable user authentication and identity assurance is an essential improvement over usernames and passwords, and innovations in mobile devices, wearables, and other technologies are helping bring biometrics to mainstream audiences. In this webinar, we'll discuss developments in biometrics and related technologies and how different markets are likely to deploy biometric authentication in 2017.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
Janice recently returned from a Special Counsel position with the Senate Judiciary Committee, where she was asked to testify and then return to staff to support the national, border and identity security aspects of the now Senate-passed immigration reform legislation. Ms. Kephart is an internationally recognized border and ID security expert, who served as counsel to the 9/11 Commission and was a key author of the Staff Monograph, 9/11 and Terrorist Travel as well as the immigration and identity security-related facts and recommendations in the 9/11 Commission Report.
More info: http://www.sibassoc.org/#!aboutsiba/csgz
Janice speaks regularly at conferences, to international media, publishes articles and opeds around the world, and has testified before Congress 16 times on issues of border and ID security.
Smart OpenID brings strong authentication for internet cloud service access to mobile devices by leveraging the crypto capabiliteis provided by smart cards and secure elements in mobile phones.
Presentation held at Chip-To-Cloud Forum in Nice, September 2012
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Mobility is increasing enterprise risk by adding further complexity and fragmentation to existing access management environments. Join us to learn how you can provide employees mobile access to enterprise applications and corporate data without compromising security.
Securing mobile starts by authenticating users and ensuring their mobile devices has not been compromised. When you authenticate a user, it’s not enough to simply confirm the user’s password is correct. You must look at other factors at the time of authentication including: time of day, device type and IP address to name just a few. This is known as risk-based authentication and it’s an important part of mobile security.
In this presentation, we provide an overview of IBM’s Mobile Security Framework and how you can use risk-based authentication to protect your enterprise.
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Why FIDO Matters: Digital Government ServicesFIDO Alliance
Presentation on why FIDO is important to government, focusing on authentication and data security.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
Five Things You Gotta Know About Modern IdentityMark Diodati
Modern identity supports the new world built on device-independent, location-anywhere access. New-school provisioning and authentication are requiremed. Its protocols are increasingly built upon frameworks like REST and JSON; examples include SCIM, OAuth OpenID Connect and FIDO. Modern identity leverages IDaaS and identity bridges to manage users and applications across the hybrid cloud.
Three trends are changing the calculus of authentication: Increased use of modern identity proofing broader adoption of adaptive authentication, and local mobile biometrics.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
Entrust provides comprehensive identity-based security solutions that safeguard
enterprises, consumers, citizens and websites. More than 4,000 organizations in 60
countries across the globe leverage Entrust's world-class security solutions, which
include strong authentication, physical and logical access, public key infrastructure
(PKI), cloud and mobile security, citizen eID, employee credentialing, SSL and
more.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
Adam Page, Reseller Account Manager at HRS, recently presented to the Lenel EMEA Sales Team (DL CCS EMEA Lenel Sales) and Lenel EMEA PM/PMM to introduce MSite Mobile - our mobile extension to Lenel's Onguard access control section.
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT security, then you will be hacked." Many analysts concur that spending on strong authentication provides the greatest security return on investment. This educational white paper, written by Richard Stiennon, Chief Research Analyst at IT-Harvest and Executive Editor of securitycurrent, explores the concept of identity platforms.
• How to fix intrinsic weaknesses in authentication regimes that result in gaping and trivially exploitable vulnerabilities
• Explore the core features of an authentication and identity platform
• Examine specific features and components organizations should require in a software authentication platform
1. All about
ICT Security
A leading ICT integrated security company
which offers you safe and pleasant security experiences
2. Mobile/ IoT Security
As a leading Mobile/ IoT integrated security company,
it is committed to enhance global Security IQ (SQ: Security IQ)
SECURITY
MOBILE
Next-Generation Integrated Authentication Service
It creates the best consumer values by developing leading technologies
such as FinTech and biometric authentication
in the next-generation authentication service sector
****
R&D/Analysis Education on Security Technology
As a part of WhiteHat’s talent nurturing program,
it is committed to reinforce professional competency of security personnel
in the financial, public, and business sectors, thereby
leading the future of the information security industry
4. Who We Are
Our Story
AWARDS GLOBAL
RaonSecure has its business philosophy in its name which refers to “Raon” meaning “pleasure” in Korean
and an English word “Secure”
Ministerial Awards from the Ministry of Science, ICT, and Future
Planning on the 3rd
Information Protection Day
Grand Prize awarded at the 14th
Mobile Technology
USIM Smart Authentication hosted by the Ministry of Science,
ICT, and Future Planning
TouchEn OnePass was FIDO-certified
Official partnership with Samsung Electronics KNOX
Accredited for its cooperation with the U.S. Apple in developing
MDM solution technology
Launched RaonSecure Inc.
Launched Security education program and Raon WhiteHat center
Accredited for its cooperation with the U.S. Apple in developing
MDM solution technology
Registered as Samsung Electronics S.E.A.P. Gold Partner
·
·
·
·
·
·
·
·
·
Launched the nation’s first mobile token
‘USIM Smart Authentication Service’ together
with telecommunications company
Raon WhiteHat center, designated as a training partner agency
for the 1st
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
·
·
2012 2013
·
·
·
·
·
·
·
·
·
·
Raon WhiteHat center, designated as a training partner agency
for the 2nd
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
Cooperation contracts with Samsung Electronics
in providing MDM solution dedicated to KNOX
and in the business and marketing
Ministerial Awards from the Ministry of Science, ICT,
and Future Planning on the 3rd
Information Protection Day
Designated as a member business in providing technological
support such as monitoring weakness in security technology
to the National Security Research Institute under Electronics
and Telecommunications Research Institute (ETRI)
MDM TouchEn mGuard was CC-certified
Launched an USIM Smart Authentication service for three major
telecommunications companies
Launched a NX-based integrated security solution
Raon WhiteHat center, designated as a training partner agency
for the 3rd
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
Launched Biometric authentication-based
simple authentication/payment solution
International FIDO-certified
2014 2015
COMPANY OVERVIEW
6. Our Approach
The approach that builds our business
As the No.1 in solution&service business and mobile security,
the company has up-to-date technology
SERVICE
Security service for smartphone authentication certificates
Mobile phone electronic signature service
Research on security technology
Education on security technology
Real-time attack and defense system
SOLUTION
Mobile/ Smartphone Security
Network/ PKI Security
PC Security/ Non-ActiveX
BIO Simple Authentication/ Payment
Integrated authentication/ Authority/ Account management
Privacy Protection
BUSINESS PORTFOLIO
8. BUSINESS PORTFOLIOSOLUTION
Mobile device management(MDM/MAM) Application forgery protection
An optimal MDM/MAM solution for mobile device management
in a mobile office and BYOD environment
A strong decompile prevention feature based on obfuscation
Application security which provides prevention solution
by disabling the operation in case of application forgery
Mobile Virtual Keypad Mobile Vaccine
The nation’s first virtual keypad solution for smartphone
The only solution compatible with all the web browsers
and smartphone applications
The nation’s first mobile vaccine solution for smartphone
Own a system which analyzes malignant code through research
by WhiteHat
Mobile OTP Mobile Web Electronic Signature
Mobile OTP solution which creates one-time password
through smartphone
Mobile SSO
The nation’s first mobile-based SSO
A solution which allows electronic signature on a mobile web
without installing Active X and Plug-in
Support banking and electronic payment services through
authentication certificates on all mobile webs
Mobile/ Smartphone Security
A solution which blocks the leakage of corporate
and private information through smart devices
9. Smartphone, Mobile device management
(MDM/MAM) – TouchEn mGuard
Optimal MDM/MAM solution which blocks the leakage of corporate and private information
in a mobile/BYOD environment
BUSINESS PORTFOLIOSOLUTION
Mobile device management
Integrated device management such as mobile device, user, corporate APP installation status,
access to device information
Central management of the status of BYOD and corporate phone
Provide a real-time monitoring on major MDM items and statistics by type
Provide an efficient Smart Office environment by strengthening security management
on mobile device
·
·
·
·
·
·
·
Block screen capture when operating mobile Office
Apply device security policy when accessing to security zone by connecting
to access control system
Prevent an illegal use by remote controlling when lost and stolen, deleting important data,
and tracking location
Prevent corporate information leakage
· Provide an on-premise APP Store to enable the central distribution/management
of my business APP
On-premise APP Store
Prevent corporate information leakage
Electronic subscription service
Mobile office
Access control system
Interconnecting security policy
to on-premise mobile services
Protecting assets of a company
by controlling mobile services
·
·
10. BUSINESS PORTFOLIOSOLUTION
PC Security / Non-ActiveX
An online security solution which safely protects
a user PC and a financial transaction environment
Keyboard security
A keyboard security solution which fundamentally prevents
a hacking attempt to intercept keyboard input
Provide its own E2E security
Personal PC firewall
Virtual Keyboard
Firewall/ vaccine solution which protects the user’s important
information from external risks
A solution which blocks hacking risks by allowing data input
on virtual keyboard only by mouse input
Provide its own E2E security
11. BUSINESS PORTFOLIOSOLUTION
Password authentication/electronic signature
Password/authentication/electronic signature solution between
web sections and various devices
Mobile password authentication
/electronic signature
A security solution which provides password/authentication
/electronic signature in moving/copying authentication
and other mobile environments
PKI Security
A security solution for wire/wireless network
Integrated authentication security
/FIDO-based BIO authentication
Effective management through an integrated platform of various authentication services
Provide an authentication service with guaranteed convenience and security
FIDO-based BIO authentication solution
A next-generation authentication solution which reconfirms user
identification on the server after verifying it in a safe hardware
security domain of the user’s smart device
Integrated authentication/authority
/account management
A solution for enterprise integrated authentication/authority
/account management in a PC and Mobile environment
- SSO (Single Sign On)
An applied security solution which allows access to various business
systems and services through single sign on when an external
/internal user needs to access multiple application servers
- EAM (Extranet Access Management)
As a security solution which controls the access of a user according
to the user’s rank, specialty, and authority, it is operated
by a set policy and an integrated authentication server
12. FIDO-based BIO Authentication
-TouchEn OnePass
A safe and simply BIO authentication solution without password
Provide a secure user authentication service which is applied to various online services
such as online backing, easy payment, game, and portal
BUSINESS PORTFOLIOSOLUTION
·
·
·
·
·
·
Work flow
****
Server
PIN, authentication,
fingerprint, face, iris
card company, portal,
shopping mall, game
Deliver verified
results only
Accord with
verified results
User smartphone (device)
Convenient
authentication
Facilitate a user’s access to service
by adopting simple but strong alternative
authentication technology
Expand the profit of the agency using
the service by eliminating additional
authentication procedures
such as SMS and ARS
Prevent personal information leakage by
storing a user’s authentication information
in a secure domain of the device
Provide various scalability such as
fingerprint, face, iris, and Secure PIN
The world’s first proven solution which
retains security and international
compatibility by winning FIDO CertifiedTM
in the field FIDO Client, Server,
ASM/Authenticator
Simple and safe authentication through
biometric authentication without
memorizing ID and Password of each
online service
14. RAON WHITEHAT CENTER
Research and education on security technology led by the world’s best WhiteHat
Elite white hackers give a lecture on up-to-date and practical hacking security techniques
to working-level security personnel
Elite white hackers provide a security audit service such as analysis on system weakness,
mock hacking, and security assessment
BUSINESS PORTFOLIOSERVICE
Research and publication
on recent hacking security technology
and security weakness
·
Awarded at multiple hacking
competitions home and abroad
The best white hacker lecturers
Effective curriculums
·
·
·
Up-to-date security to virtual business system
Application of attack and defense scenarios
Maximization of working-level security
performance through education
and establishment of a real-time attack
and defense system
·
·
·
Research
on security
technology
Education
on security
technology
Real-time
attack/defense
system
Maximizing security performance
through security technology education
The first Korean team winning
the world-class hacking competition
The best white hacker lecturers
15. Work flow
BIO Simple Authentication Service
Strengthened user identification service through BIO Simple Authentication
An occupied authentication service based on FIDO (PIN, BIO: fingerprint, face, voice, etc.)
and smartphone USIM
A Solution to security problems of the current 2nd
authentication (personal information leakage, inability
to identify SMS sender and reviver, weakness in delivering plaintext SMS)
Simple and fast authentication through fingerprint and other biometric authentications which mitigates
the inconvenience of entering SMS verification code
BUSINESS PORTFOLIOSERVICE
BIO simple authentication service
Authentication when
accessing account
2nd
authentication when
transferring money
·
·
· · ·Joining online membership
website Finding ID/Password
User identification when
purchasing products through
online shopping mall
User identification when
using easy payment
****
Enter
BIO information
Occupied authentication
completed
Deliver signature value,
phone number,
identification number
User identification through
telecommunications
company
BIO simple authentication
completed
CARD
16. PKI/ Network
security
Personal
information
protection
FinTech
security
Raon
WhiteHat
Mobile
security
Non-ActiveX
PC security
Management of smartphone device
(MDM/MAM)
Mobile vaccine
Mobile virtual keypad
Mobile phone electronic signature
Smart school MDM
Mobile OTP
Mobile SSO
APP fraud prevention
Virtual keyboard
Mobile WEB electronic signature
Electronic signature
Mobile password authentication
/ electronic signature
XML security
Accredited for international
standard technology
FIDO Certified TM
Smart OTP
User identification service
Device identification/security
FIDO simple authentication
Non-face to face
user identification
Online firewall/ vaccineKeyboard security
DB security
Healthcare security
Real-time attack/ defense system
(Cyber War Room)
자체 개발한 ‘PKI 기반의 터널링 기법’을 적용하여 키보드 입력시점부터
어플리케이션 영역까지 전 구간에서 입력 정보 유출을 차단합니다.
자체 E2E 구현하여 보안성 강화
IoT
security
Integrated
authentication
service
Service
RAONSECURE
Solution Map
A partner of K-Shield talent accreditation
education program
Research
on security technology
Education
on security technology
USIM smart authentication
18. Our Customers
It has secured a majority of customers in the financial and public sectors based on its proven technology
and experiences in the ICT integrated security market. More than 500 businesses and 30 million individual
customers in the public, financial, and business sectors are using our products and services
REFERENCES
500
Client
30,000,000
Customers
19. (6-7F Revessant B/D) 6, Bongeunsa-ro 86-gil, Gangnam-gu, Seoul, Korea
www.raonsecure.com / blog.raonsecure.com
Tel. 822 561 4545 Fax : 822 548 5350
Copyright(C)RAONSECURE All rights reserved