Your mobile phone: the ultimate authentication tool Stallion Spring Seminar 2009 www.cidway.com
Transcription
Your mobile phone: the ultimate authentication tool Stallion Spring Seminar 2009 www.cidway.com
Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool Discover the future of security on www.cidway.com A few words on CIDWAY • • • • • Swiss company based in Lausanne, Switzerland Over 10 years of experience in authentication and digital signature International network of strategic partners and resellers Presence in over 30 countries Unique proprietary patented technologies for mobile phones and Homeland security Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 2 Addressable markets Banking Homeland Security Corporate Health Mobile application Government Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 3 Business applications Application Security for Customer security • • • • • • • • • • E-Banking E-Commerce E-Government E-Brokerage E-Health care E-Gaming E-Lottery E-Government E-Loyalty M- Payment Enterprise Security for Employee security • • Remote Access Network Security Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com OEM (Original Equipment Manufacturers) • All companies requiring authentication under own brand name 4 Product portfolio overview One single authentication platform to answer all security needs and user profiles. SESAMI Mobile Time based OTP Software token for mobile phones SESAMI Slim Time based OTP Hardware token GAIA Server Authentication platform GAIA SDK Authentication platform SDK SESAMI Mobile SDK Token SDK for mobile phones Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com SESAMI SMS SMS based OTP for mobile phones 5 CIDWAY Security SA Mobile phones and their impact on our lives 2 billion By 2015, more that 2 billion people will be using mobile wallets – software that enable consumers to manage their money, including making and receiving payments, using their mobile phone. Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 7 Edgar Dunn & Company, 2008 Revealing behaviors While going to work, you realize that you forgot your wallet and mobile phone. What would you do? • 47% of surveyed people would turn back for the wallet • 83% of surveyed people would turn back for their mobile phone! Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 8 THE RED DOT EFFECT The mobile phone is becoming an essential part of our professional and personal lives. Explosion of mobile services and requirements: • Work (e-mail, agenda, remote access, notes, etc.) • Communication (conversations, VoIP, etc.) • Social network (SMS, MMS, Facebook, chat, etc.) • Purchase and payment (parking tickets, ski pass, etc.) • Finance (e-banking, billing, etc.) • Loyalty programs (vouchers, special offers, etc.) • Entertainment (games, broadcasting, etc.) Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 9 But identity theft is also increasing… Most of our identity data and personal details are duplicable, reproducible and reusable. Statistics show that overall common attacks will double each year. Common attacks are: • Brute force • PIN predilection • Keyloggers • Password sniffers • Phishing • Man in the middle attack (MITM) • Reverse ingeneering Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 10 CIDWAY Security SA Why choose mobile authentication solutions? Economic crisis – Opportunity for Mobile Solutions • • • • • • Worldwide financial crisis results in cost reduction initiatives New and alternative cost saving methods are sought Security remains a key priority Market end users now looking for a product to challenge the market Mobile Penetration rates continue to increase in emerging markets Attractive price point CIDWAY has a compelling cost reduction, yet easily scalable answer to shift from hardware to software tokens. Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 12 Why choose mobile against other authentication methods • Hardware tokens are secure but… o Very expensive o Not in the spirit of mobility (one token per access) o Time limited (replacement, etc.) o Not scaled for large deployments (ref. logistics, maintenance, etc.) • SMS are flexible and scaled for large deployments but… o Are less secure o Subject to recurring costs o Rely on network and operators • Mobile software tokens are… o Secured o Autonomous o Flexible (no limit of tokens on mobile) o Unlimited o Scaled for large deployments Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 13 CIDWAY Security SA Why choose CIDWAY? Why choose CIDWAY’s mobile solutions? Security • Algorithm and Time based One Time Passwords • Patented PIN protection in case of theft or loss of device (PIN is not stored on mobile or transmitted externally) • Protection against any form of attacks, such as • • • • • • • Cloning Brute force PIN Predilection Keyloggers Phishing Man in the middle attack (MITM) Reverse engineering • Secured registration, activation and deployment • Automatic time synchronization Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 15 Why choose CIDWAY’s mobile solutions? Compatibility and integration • Multi-OS • Java • Symbian • Blackberry • Windows CE & Pocket PC • Palm OS • Iphone • Standalone or SDK mobile token & server • Easy integration into 3rd party mobile applications • Freedom of deployment scenarios (Manual, Automatic, SMS, WAP, MMS, GPRS, NFC, etc.) Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 16 Why choose CIDWAY’s mobile solutions? Rationalization of costs • One device and one PIN for all your authentication needs (no need to carry different tokens) • Multi-Channel • Versatility (authentication, document signature, etc.) • Unlimited life span (ref. software) • No on-going maintenance or replacement costs • Free of network and operators (no hidden costs) • Up to 2/3 of cost reduction vs traditional solutions Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 17 Why choose CIDWAY’s mobile solutions? USER FRIENDLINESS • Easy and intuitive solution • Use of one familiar device • Continuous evolution of software • Create new added value services Copyright © 2008 CIDWAY Security SA. All rights reserved – www.cidway.com 18 Thank you Christophe Guignard –Marketing & Communication Manager Av. Juste-Olivier 11, 1006 Lausanne – Suisse Tél: +41 21 331 27 00 – Fax: +41 21 331 27 09 - Email: christophe.guignard@cidway.com For more information, please visit www.cidway.com