SlideShare une entreprise Scribd logo
1  sur  17
Proven. Trusted.
ESET Secure Authentication
ESET Secure Authentication




                             ESET Secure Authentication
                             provides powerful authentication to make remote access to
                             the company network and sensitive data safe, but hassle-
                             free.


                             It is a mobile-based solution
                             that uses two-factor, one time password (2FA OTP)
                             authentication for accessing the company’s VPN and OWA
                             (Outlook Web App). The advantage of one-time passwords
                             (OTPs) is that they are randomly generated and can’t be
                             predicted or reused.
ESET Secure Authentication




                   How does ESET Secure Authentication work?

                  Employees, upon remotely accessing the company network using VPN or
                  OWA, receive a one-time password on their mobile phones. This password is then
                  used to complement and strengthen the usual authentication process.
ESET Secure Authentication




                             Two-factor Authentication (2FA)
                             explained
                             As opposed to the standard password
                             authentication, 2FA OTP uses two elements. These are
                             “something that user knows”, such as a password or a
                             PIN code, and “something that user has”, typically a
                             mobile phone or hardware token.

                             Used in combination, they provide greatly
                             enhanced security for data access.
ESET Secure Authentication




                  Solves the problem of:

                     Static passwords that can be intercepted

                     User-created passwords that are not a random combination of characters
                      and can be easily guessed

                     Re-use of passwords intended for access to company assets for private accounts

                     Passwords containing user-specific data – e.g. a name, a date of birth

                     Simple patterns to derive new passwords, such as “peter1”, “peter2”, etc.
ESET Secure Authentication




                  Business benefits

                  Helps prevent the risk of breaches with unique passwords for each access

                  Protects from poor password practices

                     Saves costs – no additional hardware needed

                     Easy to migrate to and use

                     Global technical support in local languages
ESET Secure Authentication




                  IT benefits

                     Out-of-the-box solution                           iOS 4.2.1 or higher (iPhone)


                     Delivery of OTP via client app or SMS             Android 2.1 or higher


                     App works without internet connection             Windows Phone 7 or newer

                      (once installed)                                  Windows Mobile 6

                     Works with most VPN appliances                    BlackBerry 4.3 to 7.1

                     Supports most types of mobile operating systems   Symbian – all supporting J2ME

                     Global technical support in local languages       All J2ME enabled phones
ESET Secure Authentication




                 Installation and Initialization

                     To distribute the ESET Secure Authentication app on mobile phones, all you need to know
                      is the employee phone number. ESET Secure Authentication will send the user an SMS
                      with an activation link. Clicking on the link automatically downloads
                      an installer for that mobile platform.
ESET Secure Authentication




                 A closer look

                     The architecture of ESET Secure Authentication is designed to only use your existing
                      company infrastructure. In addition to the ESET Secure Authentication app on employee
                      mobiles – the client side – it contains a server application that seamlessly integrates with
                      the familiar network administrator environment of the MMC (Microsoft Management
                      Console) and ADUC (Active Directory Users & Computers).

                     Access to the app is PIN-protected to prevent any unauthorized manipulation.
Comprehensive list
of features and benefits


     Two-factor Authentication

     Client Side (mobile app)

     Server Side

     Remote Management
ESET Secure Authentication




                       Two-factor Authentication

                     Mobile-based, two-factor (2FA) one-time password (OTP) authentication
                      for a higher level of security

                     Native protection of Outlook Web App (OWA), VPNs and all
                      RADIUS-based services

                     Software only solution – no need to carry additional device or token

                     Convenient for the mobile workforce
ESET Secure Authentication




                       Client Side (mobile app)

                     One-tap installation, simple and effective user interface

                     Delivery of OTP via client application or SMS

                     OTP generating works independent of the availability of internet connection

                     Compatible with any mobile phone supporting SMS messaging

                     Supports broad range of mobile operating systems

                     PIN-protected access to prevent fraud in case of device theft or lost

                     Serves multiple OTP zones, e.g. OWA access, VPN access, and others
ESET Secure Authentication




                       Server Side

                     Out-of-the-box solution

                     Easy double-click installation and setup

                     The installer automatically recognizes OS and selects all suitable components
ESET Secure Authentication




                       Remote Management

                     Supports Microsoft Management Console (MMC)

                     Active Directory integration

                     ESET Secure Authentication extends Active Directory Users & Computers (ADUC
                      plugin) with additional features to enable managing the users’ two-factor authentication
                      settings
ESET Secure Authentication




                 System Requirements
                 Server Side                               Client Side

                 32&64-bit versions of Microsoft Windows   iOS 4.2.1 or higher (iPhone)
                 Server 2003, 2003 R2, 2008,               Android 2.1 or higher
                 2008 R2, 2012                             Windows Phone 7 or newer
                                                           Windows Mobile 6
                                                           BlackBerry 4.3 to 7.1
                                                           Symbian – all supporting J2ME
                                                           All J2ME enabled phones
COPYRIGHT © 1992 – 2013 ESET, SPOL. S R. O. ESET, LOGO ESET, NOD32, THREATSENSE, THREATSENSE.NET AND/OR OTHER MENTIONED PRODUCTS OF ESET, SPOL. S R. O., ARE REGISTERED TRADEMARKS OF
ESET, SPOL. S R. O. WINDOWS® IS A TRADEMARK OF THE MICROSOFT GROUP OF COMPANIES. OTHER HERE MENTIONED COMPANIES OR PRODUCTS MIGHT BE REGISTERED TRADEMARKS OF THEIR PROPRIETORS. PRODUCED
ACCORDING TO QUALITY STANDARDS OF ISO 9001:2000.

Contenu connexe

Tendances

IP-600 IP Network Audio System Design Templates
IP-600 IP Network Audio System Design TemplatesIP-600 IP Network Audio System Design Templates
IP-600 IP Network Audio System Design Templates
Eric Zhang-CMX Audio
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhane
Kamal Lamichhane
 

Tendances (20)

Final year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetoothFinal year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetooth
 
Final year project presentation IOT Based home security system
Final year project presentation IOT Based home security systemFinal year project presentation IOT Based home security system
Final year project presentation IOT Based home security system
 
DNS Server Configuration with Cisco Packet Tracer
DNS Server Configuration with Cisco Packet TracerDNS Server Configuration with Cisco Packet Tracer
DNS Server Configuration with Cisco Packet Tracer
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
E ball technology ppt
E ball technology pptE ball technology ppt
E ball technology ppt
 
Silent sound technology- Technology towards change.
Silent sound technology- Technology towards change.Silent sound technology- Technology towards change.
Silent sound technology- Technology towards change.
 
Blackberry technology
Blackberry technologyBlackberry technology
Blackberry technology
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Tally erp9 help for hotel module
Tally erp9 help for hotel moduleTally erp9 help for hotel module
Tally erp9 help for hotel module
 
Boss audio-systems-cx1800
Boss audio-systems-cx1800Boss audio-systems-cx1800
Boss audio-systems-cx1800
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
IP-600 IP Network Audio System Design Templates
IP-600 IP Network Audio System Design TemplatesIP-600 IP Network Audio System Design Templates
IP-600 IP Network Audio System Design Templates
 
Raspberry Pi controlled Home Automation
Raspberry Pi controlled Home AutomationRaspberry Pi controlled Home Automation
Raspberry Pi controlled Home Automation
 
5 pen pc technology (pen style computing)
5 pen pc technology (pen style computing)5 pen pc technology (pen style computing)
5 pen pc technology (pen style computing)
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhane
 

En vedette

What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
Rambus Inc
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 

En vedette (8)

Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012
 
Simple Two Factor Authentication
Simple Two Factor AuthenticationSimple Two Factor Authentication
Simple Two Factor Authentication
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similaire à ESET is introducing its brand new product ESET Secure Authentication

Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 

Similaire à ESET is introducing its brand new product ESET Secure Authentication (20)

Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEETESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Plus de ESET

Plus de ESET (20)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 

Dernier

Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 

Dernier (20)

Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 

ESET is introducing its brand new product ESET Secure Authentication

  • 3. ESET Secure Authentication ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle- free. It is a mobile-based solution that uses two-factor, one time password (2FA OTP) authentication for accessing the company’s VPN and OWA (Outlook Web App). The advantage of one-time passwords (OTPs) is that they are randomly generated and can’t be predicted or reused.
  • 4. ESET Secure Authentication How does ESET Secure Authentication work? Employees, upon remotely accessing the company network using VPN or OWA, receive a one-time password on their mobile phones. This password is then used to complement and strengthen the usual authentication process.
  • 5. ESET Secure Authentication Two-factor Authentication (2FA) explained As opposed to the standard password authentication, 2FA OTP uses two elements. These are “something that user knows”, such as a password or a PIN code, and “something that user has”, typically a mobile phone or hardware token. Used in combination, they provide greatly enhanced security for data access.
  • 6. ESET Secure Authentication Solves the problem of:  Static passwords that can be intercepted  User-created passwords that are not a random combination of characters and can be easily guessed  Re-use of passwords intended for access to company assets for private accounts  Passwords containing user-specific data – e.g. a name, a date of birth  Simple patterns to derive new passwords, such as “peter1”, “peter2”, etc.
  • 7. ESET Secure Authentication Business benefits  Helps prevent the risk of breaches with unique passwords for each access  Protects from poor password practices  Saves costs – no additional hardware needed  Easy to migrate to and use  Global technical support in local languages
  • 8. ESET Secure Authentication IT benefits  Out-of-the-box solution iOS 4.2.1 or higher (iPhone)  Delivery of OTP via client app or SMS Android 2.1 or higher  App works without internet connection Windows Phone 7 or newer (once installed) Windows Mobile 6  Works with most VPN appliances BlackBerry 4.3 to 7.1  Supports most types of mobile operating systems Symbian – all supporting J2ME  Global technical support in local languages All J2ME enabled phones
  • 9. ESET Secure Authentication Installation and Initialization  To distribute the ESET Secure Authentication app on mobile phones, all you need to know is the employee phone number. ESET Secure Authentication will send the user an SMS with an activation link. Clicking on the link automatically downloads an installer for that mobile platform.
  • 10. ESET Secure Authentication A closer look  The architecture of ESET Secure Authentication is designed to only use your existing company infrastructure. In addition to the ESET Secure Authentication app on employee mobiles – the client side – it contains a server application that seamlessly integrates with the familiar network administrator environment of the MMC (Microsoft Management Console) and ADUC (Active Directory Users & Computers).  Access to the app is PIN-protected to prevent any unauthorized manipulation.
  • 11. Comprehensive list of features and benefits Two-factor Authentication Client Side (mobile app) Server Side Remote Management
  • 12. ESET Secure Authentication Two-factor Authentication  Mobile-based, two-factor (2FA) one-time password (OTP) authentication for a higher level of security  Native protection of Outlook Web App (OWA), VPNs and all RADIUS-based services  Software only solution – no need to carry additional device or token  Convenient for the mobile workforce
  • 13. ESET Secure Authentication Client Side (mobile app)  One-tap installation, simple and effective user interface  Delivery of OTP via client application or SMS  OTP generating works independent of the availability of internet connection  Compatible with any mobile phone supporting SMS messaging  Supports broad range of mobile operating systems  PIN-protected access to prevent fraud in case of device theft or lost  Serves multiple OTP zones, e.g. OWA access, VPN access, and others
  • 14. ESET Secure Authentication Server Side  Out-of-the-box solution  Easy double-click installation and setup  The installer automatically recognizes OS and selects all suitable components
  • 15. ESET Secure Authentication Remote Management  Supports Microsoft Management Console (MMC)  Active Directory integration  ESET Secure Authentication extends Active Directory Users & Computers (ADUC plugin) with additional features to enable managing the users’ two-factor authentication settings
  • 16. ESET Secure Authentication System Requirements Server Side Client Side 32&64-bit versions of Microsoft Windows iOS 4.2.1 or higher (iPhone) Server 2003, 2003 R2, 2008, Android 2.1 or higher 2008 R2, 2012 Windows Phone 7 or newer Windows Mobile 6 BlackBerry 4.3 to 7.1 Symbian – all supporting J2ME All J2ME enabled phones
  • 17. COPYRIGHT © 1992 – 2013 ESET, SPOL. S R. O. ESET, LOGO ESET, NOD32, THREATSENSE, THREATSENSE.NET AND/OR OTHER MENTIONED PRODUCTS OF ESET, SPOL. S R. O., ARE REGISTERED TRADEMARKS OF ESET, SPOL. S R. O. WINDOWS® IS A TRADEMARK OF THE MICROSOFT GROUP OF COMPANIES. OTHER HERE MENTIONED COMPANIES OR PRODUCTS MIGHT BE REGISTERED TRADEMARKS OF THEIR PROPRIETORS. PRODUCED ACCORDING TO QUALITY STANDARDS OF ISO 9001:2000.