Your mobile phone: the ultimate authentication tool Stallion Spring Seminar 2009 www.cidway.com

Transcription

Your mobile phone: the ultimate authentication tool Stallion Spring Seminar 2009 www.cidway.com
Stallion Spring Seminar 2009
Your mobile phone: the ultimate authentication tool
Discover the future of security on www.cidway.com
A few words on CIDWAY
•
•
•
•
•
Swiss company based in Lausanne, Switzerland
Over 10 years of experience in authentication and digital signature
International network of strategic partners and resellers
Presence in over 30 countries
Unique proprietary patented technologies for mobile phones and
Homeland security
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
2
Addressable markets
Banking
Homeland Security
Corporate
Health
Mobile application
Government
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
3
Business applications
Application Security for
Customer security
•
•
•
•
•
•
•
•
•
•
E-Banking
E-Commerce
E-Government
E-Brokerage
E-Health care
E-Gaming
E-Lottery
E-Government
E-Loyalty
M- Payment
Enterprise Security for
Employee security
•
•
Remote Access
Network Security
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
OEM
(Original Equipment Manufacturers)
•
All companies requiring
authentication under own
brand name
4
Product portfolio overview
One single authentication platform to answer all security needs and user profiles.
SESAMI Mobile
Time based OTP Software token for
mobile phones
SESAMI Slim
Time based OTP Hardware token
GAIA Server
Authentication platform
GAIA SDK
Authentication platform SDK
SESAMI Mobile SDK
Token SDK for mobile phones
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
SESAMI SMS
SMS based OTP for mobile phones
5
CIDWAY Security SA
Mobile phones and their impact on our lives
2 billion
By 2015, more that 2 billion people will be using mobile wallets – software that
enable consumers to manage their money, including making and receiving
payments, using their mobile phone.
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
7
Edgar Dunn & Company, 2008
Revealing behaviors
While going to work, you realize that you forgot your wallet
and mobile phone. What would you do?
• 47% of surveyed people would turn
back for the wallet
• 83% of surveyed people would turn
back for their mobile phone!
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
8
THE RED DOT EFFECT
The mobile phone is becoming an essential part of our professional and
personal lives.
Explosion of mobile services and requirements:
• Work (e-mail, agenda, remote access, notes, etc.)
• Communication (conversations, VoIP, etc.)
• Social network (SMS, MMS, Facebook, chat, etc.)
• Purchase and payment (parking tickets, ski pass, etc.)
• Finance (e-banking, billing, etc.)
• Loyalty programs (vouchers, special offers, etc.)
• Entertainment (games, broadcasting, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
9
But identity theft is also increasing…
Most of our identity data and personal details are duplicable, reproducible
and reusable.
Statistics show that overall common attacks will double each year.
Common attacks are:
• Brute force
• PIN predilection
• Keyloggers
• Password sniffers
• Phishing
• Man in the middle attack (MITM)
• Reverse ingeneering
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
10
CIDWAY Security SA
Why choose mobile authentication solutions?
Economic crisis – Opportunity for Mobile Solutions
•
•
•
•
•
•
Worldwide financial crisis results in cost reduction initiatives
New and alternative cost saving methods are sought
Security remains a key priority
Market end users now looking for a product to challenge the market
Mobile Penetration rates continue to increase in emerging markets
Attractive price point
CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software
tokens.
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
12
Why choose mobile against other authentication methods
•
Hardware tokens are secure but…
o Very expensive
o Not in the spirit of mobility (one token per access)
o Time limited (replacement, etc.)
o Not scaled for large deployments (ref. logistics, maintenance, etc.)
•
SMS are flexible and scaled for large deployments but…
o Are less secure
o Subject to recurring costs
o Rely on network and operators
•
Mobile software tokens are…
o Secured
o Autonomous
o Flexible (no limit of tokens on mobile)
o Unlimited
o Scaled for large deployments
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
13
CIDWAY Security SA
Why choose CIDWAY?
Why choose CIDWAY’s mobile solutions?
Security
•
Algorithm and Time based One Time Passwords
•
Patented PIN protection in case of theft or loss of device
(PIN is not stored on mobile or transmitted externally)
•
Protection against any form of attacks, such as
•
•
•
•
•
•
•
Cloning
Brute force
PIN Predilection
Keyloggers
Phishing
Man in the middle attack (MITM)
Reverse engineering
•
Secured registration, activation and deployment
•
Automatic time synchronization
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
15
Why choose CIDWAY’s mobile solutions?
Compatibility and integration
•
Multi-OS
• Java
• Symbian
• Blackberry
• Windows CE & Pocket PC
• Palm OS
• Iphone
•
Standalone or SDK mobile token & server
•
Easy integration into 3rd party mobile applications
•
Freedom of deployment scenarios
(Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.)
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
16
Why choose CIDWAY’s mobile solutions?
Rationalization of costs
•
One device and one PIN for all your authentication needs
(no need to carry different tokens)
•
Multi-Channel
•
Versatility (authentication, document signature, etc.)
•
Unlimited life span (ref. software)
•
No on-going maintenance or replacement costs
•
Free of network and operators (no hidden costs)
•
Up to 2/3 of cost reduction vs traditional solutions
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
17
Why choose CIDWAY’s mobile solutions?
USER FRIENDLINESS
•
Easy and intuitive solution
•
Use of one familiar device
•
Continuous evolution of software
•
Create new added value services
Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com
18
Thank you
Christophe Guignard –Marketing & Communication Manager
Av. Juste-Olivier 11, 1006 Lausanne – Suisse
Tél: +41 21 331 27 00 – Fax: +41 21 331 27 09 - Email: christophe.guignard@cidway.com
For more information, please visit www.cidway.com