SlideShare a Scribd company logo
1 of 40
Conveniently Solving
                                 the Secure Identity
                                        Challenges




                                                Marcel Kuiken
                                          Area Sales Manager
© 2012 - VASCO Data Security
                                 Enterprise Security Nederland
Imagine
                                   Peace




© 2012 - VASCO Data Security
in Reality
                                     but

                                   it is war




© 2012 - VASCO Data Security
a Digital
                                    war




© 2012 - VASCO Data Security
Trojan
                                with

                                       horses




© 2012 - VASCO Data Security
Pirates
                                   with




© 2012 - VASCO Data Security
Phishers
                                    with




© 2012 - VASCO Data Security
Viruses
                                   with




© 2012 - VASCO Data Security
Spam
                                 with




© 2012 - VASCO Data Security
Intrusions
                                with




© 2012 - VASCO Data Security
breaches




© 2012 - VASCO Data Security   Conveniently Solving the Secure Identity Challenges
                                                                              11
Please log in to get started




                                   JohnDoe

                                   ********
                                                    x8per day




© 2012 - VASCO Data Security                  Lunch & Learn Infosecurity 2012   12
Digital Identity




                               x7
                               apps




© 2012 - VASCO Data Security           Lunch & Learn Infosecurity 2012   13
Digital Identity Expanded




                               25
                               accounts




© 2012 - VASCO Data Security               Lunch & Learn Infosecurity 2012   14
The Internet of Things
    World
 Population            6.3 Billion         6.8 Billion         7.2 Billion              7.6 Billion
 Connected             500 Million         12.5 Billion        25 Billion               50 Billion
   Devices




                                                    x4
                                                     devices




Connected
                                   More devices
   Devices                  0.08                  1.84             3.47                       6.85
                                   than people
Per Person
                           2003                   2010             2015                      2020
© 2012 - VASCO Data Security                                                 Lunch & Learn Infosecurity 2012   15
Source: Cisco IBSG, April 2011
Convergence




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   16
Multi-Device and Digital Identity




© 2012 - VASCO Data Security                      Lunch & Learn Infosecurity 2012   17
How many passwords do you have?

                                                                   PASSWORD
                                                                            2%




                                                                          26%



                                                                          23%

                                        6
                                      passwords
                                                                          18%



                                                                          15%



                                                                          16%


© 2012 - VASCO Data Security                      Lunch & Learn Infosecurity 2012   18
Which password for which site?

                                                                PASSWORD
                                                                         2%




                                                                       26%



                                                                       23%



                                                                       18%



                                                                       15%



                                                                       16%


© 2012 - VASCO Data Security                   Lunch & Learn Infosecurity 2012   19
Convenient but not Secure

                                               V       V   V
                                           V                   V
                                   V
                                                                       V
                               V
                                                                           V
                       V
                                               V                               V
                     V

                     V                 V                       V
                                                                               V
                                                                                            1
                                                                                         Password
                                                                               V
                         V
                                                                             V
                             V                     V
                                                                       V
                                   V                               V
                                           V               V
                                               V       V
© 2012 - VASCO Data Security                                           Lunch & Learn Infosecurity 2012   20
Bill Gates

 “People use the same password on different systems,
 they write them down and they just don’t meet the
 challenge for anything you really want to secure”




© 2012 - VASCO Data Security
Video




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   22
DIGIPASS




© 2012 - VASCO Data Security
Core Activities




© 2012 - VASCO Data Security   Conveniently Solving the Secure Identity Challenges   24
VASCO Philosophy & Perspective



                                           Security




                                    Ease                  Cost




© 2012 - VASCO Data Security                   Conveniently Solving the Secure Identity Challenges   25
References in Financial Institutions




© 2012 - VASCO Data Security                   Lunch & Learn Infosecurity 2012   26
References in Enterprise Market




© 2012 - VASCO Data Security                     Lunch & Learn Infosecurity 2012   27
Sold & Deployed DIGIPASS world wide


      DIGIPASS             DIGIPASS
        GO 3                 GO 6                 DIGIPASS          DIGIPASS          DIGIPASS     DIGIPASS     DIGIPASS    DIGIPASS     DIGIPASS
                                                   CertiID           Key 101          250 -251     260 -261       270       270 XPress     275




     DIGIPASS              DIGIPASS
       GO 7                 GO 100                DIGIPASS          DIGIPASS
                                                   Key 200           Key 860
                                                                                             DIGIPASS       DIGIPASS   DIGIPASS     DIGIPASS
                                                                                              301 CV          550        560          736




 Virtual        DIGIPASS       DIGIPASS     DIGIPASS    DIGIPASS      DIGIPASS    DIGIPASS       DIGIPASS        DIGIPASS     DIGIPASS     DIGIPASS
DIGIPASS          Nano         for Mobile     805         800           810         815            820             830          831          835A




     DIGIPASS         DIGIPASS              DIGIPASS     DIGIPASS      DIGIPASS   DIGIPASS       DIGIPASS        DIGIPASS     DIGIPASS         DIGIPASS
    for Windows        for Web                836          837           840A      840 CV          855             865          905              920

   © 2012 - VASCO Data Security                                                                       Lunch & Learn Infosecurity 2012              28
DIGIPASS Omnipresent




                                        IPT
                    dP+




                  DESS                  DESS
© 2012 - VASCO Data Security
Can Digipass authentication be an
    enabler for online applications ?




© 2012 - VASCO Data Security
Application Owners vs Users
Application concerns:                 User concerns:

-   Community                         -   Ease of Use
-   Conversion                        -   From my lazy chair
-   Traffic                           -   On my iPad
-   Cost                              -   On my new Smart TV
-   End-User Stickyness               -   Via my iPhone please
-   Margin                            -   Secure
-   Turnover                          -   Free
-   Profit                            -   Mobility
-   Fraude                            -   Privacy
-   SW@N                              -   Identity
-   Reputation                        -   Value
-   Ranking                           -   Cool Design
-   Competition                       -   Just 1 login to all my apps
-   Deployment                        -   Not any more passwords please
-   Churn                             -   No new account opening
-   ……….                              -   …..


© 2012 - VASCO Data Security                       Lunch & Learn Infosecurity 2012   31
Secure Login Webshop




© 2012 - VASCO Data Security           Lunch & Learn Infosecurity 2012   32
© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   33
Multiplatform




© 2012 - VASCO Data Security       MYDIGIPASS.COM   34
Apple Demo




© 2012 - VASCO Data Security
Application Owners vs Users
Application concerns:                 User concerns:

-   Community                         -   Ease of Use
-   Conversion                        -   From my lazy chair
-   Traffic                           -   On my iPad in the bathroom
-   Cost                              -   On my new Smart TV
-   End-User Stickyness               -   Via my iPhone please
-   Margin                            -   Secure
-   Turnover                          -   Free
-   Profit                            -   Mobility
-   Fraude                            -   Privacy
-   SW@N                              -   Identity
-   Reputation                        -   Value
-   Ranking                           -   Cool Design
-   Competition                       -   Just 1 login to all my apps
-   Deployment                        -   Not any more passwords please
-   Churn                             -   No new account opening
-   ……….                              -   …..


© 2012 - VASCO Data Security                       Lunch & Learn Infosecurity 2012   36
Signup today




© 2012 - VASCO Data Security   Lunch & Learn Infosecurity 2012   37
Let’s make business together




© 2012 - VASCO Data Security                  Lunch & Learn Infosecurity 2012   38
Thank You




                           Marcel Kuiken
                           Area Sales Manager
                           Enterprise Security Nederland

                           marcel.kuiken@vasco.com

                           GSM: 06-13593579
© 2012 - VASCO Data Security
Copyright & Trademarks

 Copyright
    2012 VASCO Data Security. All rights reserved.
 No part of this publication may be reproduced, stored in a retrieval system, or
 transmitted, in any form or by any means, electronic, mechanical, photocopying,
 recording, or otherwise, without the prior written permission of VASCO Data
 Security.

 Trademarks
 VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® and the                ® logo

 are registered or unregistered trademarks of VASCO Data Security, Inc. and/or
 VASCO Data Security International GmbH in the U.S. and other countries

 Disclaimer of Warranties and Limitations of Liabilities
 This Report is provided on an 'as is' basis, without any other warranties,
 or conditions.



© 2012 - VASCO Data Security                               Lunch & Learn Infosecurity 2012   40

More Related Content

Viewers also liked

Viewers also liked (11)

μπουντακασ μπητροσ-ασκηση 1
μπουντακασ μπητροσ-ασκηση 1μπουντακασ μπητροσ-ασκηση 1
μπουντακασ μπητροσ-ασκηση 1
 
aXsGuard Gatekeeper
aXsGuard GatekeeperaXsGuard Gatekeeper
aXsGuard Gatekeeper
 
φυλλομετρητεσ
φυλλομετρητεσφυλλομετρητεσ
φυλλομετρητεσ
 
Advanced controlls for android games
Advanced controlls for android gamesAdvanced controlls for android games
Advanced controlls for android games
 
Password fatigation
Password fatigationPassword fatigation
Password fatigation
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
ασφάλεια στο διαδίκτυο
ασφάλεια στο διαδίκτυοασφάλεια στο διαδίκτυο
ασφάλεια στο διαδίκτυο
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
MYDIGIPASS.COM
MYDIGIPASS.COMMYDIGIPASS.COM
MYDIGIPASS.COM
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 

Similar to DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient authentication from any device without passwords - Single sign-on for a seamless user experienceBy balancing security and usability, DIGIPASS can enable new applications while respecting user preferences for convenience. It offers a win-win solution

DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldAndris Soroka
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa Data
 
Accel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNECIndia
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groepDerk Yntema
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at CiscoCisco Canada
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
WBSN Q412 Investor Presentation
WBSN Q412 Investor PresentationWBSN Q412 Investor Presentation
WBSN Q412 Investor Presentationavelinakauffman
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaInternet World
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Riverbed Technology
 
Deploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesDeploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesCisco Canada
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 

Similar to DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient authentication from any device without passwords - Single sign-on for a seamless user experienceBy balancing security and usability, DIGIPASS can enable new applications while respecting user preferences for convenience. It offers a win-win solution (20)

DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The World
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013
 
Accel klantenevent 2016: Vasco
Accel klantenevent 2016: VascoAccel klantenevent 2016: Vasco
Accel klantenevent 2016: Vasco
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security Solutions
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groep
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at Cisco
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
WBSN Q412 Investor Presentation
WBSN Q412 Investor PresentationWBSN Q412 Investor Presentation
WBSN Q412 Investor Presentation
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10
 
Deploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesDeploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI Services
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

DIGIPASS authentication can address both concerns by providing:- Strong security to build trust and grow the community- Convenient authentication from any device without passwords - Single sign-on for a seamless user experienceBy balancing security and usability, DIGIPASS can enable new applications while respecting user preferences for convenience. It offers a win-win solution

  • 1. Conveniently Solving the Secure Identity Challenges Marcel Kuiken Area Sales Manager © 2012 - VASCO Data Security Enterprise Security Nederland
  • 2. Imagine Peace © 2012 - VASCO Data Security
  • 3. in Reality but it is war © 2012 - VASCO Data Security
  • 4. a Digital war © 2012 - VASCO Data Security
  • 5. Trojan with horses © 2012 - VASCO Data Security
  • 6. Pirates with © 2012 - VASCO Data Security
  • 7. Phishers with © 2012 - VASCO Data Security
  • 8. Viruses with © 2012 - VASCO Data Security
  • 9. Spam with © 2012 - VASCO Data Security
  • 10. Intrusions with © 2012 - VASCO Data Security
  • 11. breaches © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 11
  • 12. Please log in to get started JohnDoe ******** x8per day © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 12
  • 13. Digital Identity x7 apps © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 13
  • 14. Digital Identity Expanded 25 accounts © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 14
  • 15. The Internet of Things World Population 6.3 Billion 6.8 Billion 7.2 Billion 7.6 Billion Connected 500 Million 12.5 Billion 25 Billion 50 Billion Devices x4 devices Connected More devices Devices 0.08 1.84 3.47 6.85 than people Per Person 2003 2010 2015 2020 © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 15 Source: Cisco IBSG, April 2011
  • 16. Convergence © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 16
  • 17. Multi-Device and Digital Identity © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 17
  • 18. How many passwords do you have? PASSWORD 2% 26% 23% 6 passwords 18% 15% 16% © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 18
  • 19. Which password for which site? PASSWORD 2% 26% 23% 18% 15% 16% © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 19
  • 20. Convenient but not Secure V V V V V V V V V V V V V V V V V 1 Password V V V V V V V V V V V V © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 20
  • 21. Bill Gates “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure” © 2012 - VASCO Data Security
  • 22. Video © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 22
  • 23. DIGIPASS © 2012 - VASCO Data Security
  • 24. Core Activities © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 24
  • 25. VASCO Philosophy & Perspective Security Ease Cost © 2012 - VASCO Data Security Conveniently Solving the Secure Identity Challenges 25
  • 26. References in Financial Institutions © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 26
  • 27. References in Enterprise Market © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 27
  • 28. Sold & Deployed DIGIPASS world wide DIGIPASS DIGIPASS GO 3 GO 6 DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS CertiID Key 101 250 -251 260 -261 270 270 XPress 275 DIGIPASS DIGIPASS GO 7 GO 100 DIGIPASS DIGIPASS Key 200 Key 860 DIGIPASS DIGIPASS DIGIPASS DIGIPASS 301 CV 550 560 736 Virtual DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS Nano for Mobile 805 800 810 815 820 830 831 835A DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS DIGIPASS for Windows for Web 836 837 840A 840 CV 855 865 905 920 © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 28
  • 29. DIGIPASS Omnipresent IPT dP+ DESS DESS © 2012 - VASCO Data Security
  • 30. Can Digipass authentication be an enabler for online applications ? © 2012 - VASCO Data Security
  • 31. Application Owners vs Users Application concerns: User concerns: - Community - Ease of Use - Conversion - From my lazy chair - Traffic - On my iPad - Cost - On my new Smart TV - End-User Stickyness - Via my iPhone please - Margin - Secure - Turnover - Free - Profit - Mobility - Fraude - Privacy - SW@N - Identity - Reputation - Value - Ranking - Cool Design - Competition - Just 1 login to all my apps - Deployment - Not any more passwords please - Churn - No new account opening - ………. - ….. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 31
  • 32. Secure Login Webshop © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 32
  • 33. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 33
  • 34. Multiplatform © 2012 - VASCO Data Security MYDIGIPASS.COM 34
  • 35. Apple Demo © 2012 - VASCO Data Security
  • 36. Application Owners vs Users Application concerns: User concerns: - Community - Ease of Use - Conversion - From my lazy chair - Traffic - On my iPad in the bathroom - Cost - On my new Smart TV - End-User Stickyness - Via my iPhone please - Margin - Secure - Turnover - Free - Profit - Mobility - Fraude - Privacy - SW@N - Identity - Reputation - Value - Ranking - Cool Design - Competition - Just 1 login to all my apps - Deployment - Not any more passwords please - Churn - No new account opening - ………. - ….. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 36
  • 37. Signup today © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 37
  • 38. Let’s make business together © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 38
  • 39. Thank You Marcel Kuiken Area Sales Manager Enterprise Security Nederland marcel.kuiken@vasco.com GSM: 06-13593579 © 2012 - VASCO Data Security
  • 40. Copyright & Trademarks Copyright 2012 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries Disclaimer of Warranties and Limitations of Liabilities This Report is provided on an 'as is' basis, without any other warranties, or conditions. © 2012 - VASCO Data Security Lunch & Learn Infosecurity 2012 40

Editor's Notes

  1. CHAT: How many times a day do you login on a website?Today somelarge websites have their customers' passwords floating around on the Internet.
  2. CHAT: How many differentwebsites with a login screen do you visit in a week?Every day you encounter log-in screens, that protect your most valuable work. Requiring you to type in a password, and this around 8 times per day.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  3. CHAT: On how many sites have you created an account with a username and password?72% of the users have more than 5 online accounts.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  4. CHAT: How many different devices do you use to access the Internet and what are they?Log-in screens that that give you access to a big load of different web applications. With an average of 25 web applications per user.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  5. Enabling you access with your laptop, desktop, smart phone, and tablet.
  6. Today these worlds collide.
  7. CHAT: How many different passwords do you have to protect these accounts.Users having multiple devices to access multiple services.
  8. All secured by a multitude of passwords. Having an average of 6 passwords: based upon pet names, family names, birthdays, nicknames, the word “PASSWORD” and in some cases a random password.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf
  9. CHAT: How do you remember those passwords?This would mean that each password is shared across 4 different sites. So the inconvenience does not become remembering the passwords, but rather which password was used for which site.“A Large Scale Study of Web Password Habits”Microsoft Research 2007http://research.microsoft.com/en-us/um/people/cormac/Papers/www2007.pdf“Office workers give away passwords for a cheap pen”Infosecurity Europe 2003http://www.theregister.co.uk/content/55/30324.html
  10. So to keep it convenient  you revert back to 1 password, write it down, store it onto your desktop, laptop, tablet and mobile phone, creating a security risk for your valuable work. Because there is only one password to rule all the applications. And that one password will be stored by all the different Web Applications, and as many as 30%are thought to store that passwords in the clear.“You might care about security online but do you understand it? ”http://scott-allison.net/2011/08/19/you-might-care-about-security-online-but-do-you-understand-it/“RockYou Hacker: 30% of Sites Store Plain Text Passwords”http://www.readwriteweb.com/archives/rockyou_hacker_30_of_sites_store_plain_text_passwords.php
  11. A famous man once said that “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure”Bill Gates (2004 RSA Security Conference)
  12. But why make this your concern as a Web Application Provider? Simply because you are losing money. By Fraud, inconvenience and Total Cost Of Ownership.
  13. Raise Hand: Who knows what a DIGIPASS is?That is why more than 25 years ago we at VASCO created the DIGIPASS. This is a onetime password generator that can be used as a 2 Factor authentication solution. Making any log-in a secure log-in. As the generated password can only be used once during a limited amount of time.
  14. CHAT: Can you give an example where you use user authentication.CHAT: Can you give an example where you use electronic signature.CHAT: Can you give an example where you use digital signature.We deliver software and hardware solutions with regard to user authentication, electronic signature, and digital signature.
  15. Offering the best solution for every customer is finding the balance between price, user convenience and security
  16. Raise Hand: Is your bank using 2FA?More than 1,700 financial institutions/Banks all over the world gave us the necessary confidence.
  17. Over 8,000 enterprise customers are in our reference list.
  18. Annotation: Highlight the DIGIPASS you are using today, if none mark the white area.VASCO sold & deployed and delivered more than 100,000,000 DIGIPASS devices, with a wide range in shape, size, color, and functionality.
  19. The DIGIPASS Embedded Solution Strategy will enable 1.000.000.000 dormant DIGIPASS authenticators in 2014. By embedding our technology into other products, any user will have access to a DIGIPASS.
  20. Raise Hand: Who knows what a DIGIPASS is?That is why more than 25 years ago we at VASCO created the DIGIPASS. This is a onetime password generator that can be used as a 2 Factor authentication solution. Making any log-in a secure log-in. As the generated password can only be used once during a limited amount of time.
  21. No matter whetheryouuse MYDIGIPASS.COM on a PC, Smartphone or tablet, the applicationautomaticallyresizesto fit your device.
  22. Berghs Kurt our Product Manager and Rousseau Philippe our sales specialist will join us to answer your remaining questions.